NIST logo

Publications Portal

You searched on:
Author: elaine barker
Sorted by: title

Displaying records 31 to 38.
Resort by: Date / Title


31. Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-90
Published: 3/14/2007
Authors: Elaine B Barker, John M Kelsey
Abstract: [Superseded by SP 800-90A (January 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910345] This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50814

32. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
Series: Special Publication (NIST SP)
Report Number: 800-67 Rev 1
Published: 1/23/2012
Authors: William C Barker, Elaine B Barker
Abstract: This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2 ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910079

33. Report on the Development of the Advanced Encryption Standard (AES)
Series: Journal of Research (NIST JRES)
Published: 6/1/2001
Authors: James R Nechvatal, Elaine B Barker, Lawrence E Bassham, William Edward Burr, Morris J Dworkin, James Foti, E Roback
Abstract: In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibiliti ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151226

34. Secure Hash Standard (SHS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 180-3
Published: 10/31/2008
Authors: Elaine B Barker, Quynh H Dang
Abstract: [Superseded by FIPS 180-4 (March 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910977] This standard specifies five hash algorithms that can be used to generate digests of messages. The digests are used to detect whether message ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901372

35. Status Report on the First Round of the Development of the Advanced Encryption Standard
Series: Journal of Research (NIST JRES)
Published: 11/17/1999
Authors: James R Nechvatal, Elaine B Barker, Donna F Dodson, Morris J Dworkin, James Foti, E Roback
Abstract: In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal Information, in furtherance of NIST's statutory responsib ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151195

36. Summary of the Workshop on Cryptographic Key Management Systems (CKMS)
Published: 1/10/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad
Abstract: A workshop was held on September 10-11, 2012 to discuss two documents that have been posted for public comment: SP 800-130 (A Framework for Designing Cryptographic Key Management Systems) and a table of proposed requirements for SP 800-152 (A Profile ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912497

37. The Keyed-Hash Message Authentication Code (HMAC)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 198
Published: 3/6/2002
Authors: Elaine B Barker, Quynh H Dang
Abstract: [Superseded by FIPS 198-1(July 2008): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901614] This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash funct ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901425

38. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
Series: Special Publication (NIST SP)
Report Number: 800-131A
Published: 1/13/2011
Authors: Elaine B Barker, Allen L Roginsky
Abstract: At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907517



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series