NIST logo

Publications Portal

You searched on:
Author: lawrence bassham

Displaying records 1 to 10 of 13 records.
Resort by: Date / Title


1. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7896
Published: 11/15/2012
Authors: Shu-jen H Chang, Ray A Perlner, William E. (William E.) Burr, Meltem Sonmez Turan, John M Kelsey, Souradyuti Paul, Lawrence E Bassham
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms specified in the Federal Information Processing St ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912724

2. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7764
Published: 2/23/2011
Authors: Meltem Sonmez Turan, Ray A Perlner, Lawrence E Bassham, William E. (William E.) Burr, Dong H. Chang, Shu-jen H Chang, Morris J Dworkin, John M Kelsey, Souradyuti Paul, Rene C Peralta
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information Pro ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907913

3. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Series: Special Publication (NIST SP)
Report Number: 800-22 Rev 1a
Published: 9/16/2010
Authors: Lawrence E Bassham, Andrew L Rukhin, Juan Soto, James R Nechvatal, Miles E. Smid, Stefan D Leigh, M Levenson, M Vangel, Nathanael A Heckert, D L. Banks
Abstract: This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many cryptographic applications, such as the generation of key material. Generators suitable for use i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906762

4. Advanced Encryption Standard (AES)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 197
Published: 11/26/2001
Authors: Morris J Dworkin, Elaine B Barker, James R Nechvatal, James Foti, Lawrence E Bassham, E Roback, James F Dray Jr
Abstract: The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901427

5. Report on the Development of the Advanced Encryption Standard (AES)
Series: Journal of Research (NIST JRES)
Published: 6/1/2001
Authors: James R Nechvatal, Elaine B Barker, Lawrence E Bassham, William E. (William E.) Burr, Morris J Dworkin, James Foti, E Roback
Abstract: In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST's statutory responsibiliti ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151226

6. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard
Published: 4/1/2000
Author: Lawrence E Bassham
Abstract: This paper describes the testing methodology used in ANSI C efficiency testing of the Round 2 Candidates for the Advanced Encryption Standard, along with a few observations regarding those measurements. This paper also has tables of timing and cycle ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151210

7. Randomness Testing of the Advanced Encryption Standard Finalist Candidates
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6483
Published: 4/1/2000
Authors: Juan Soto, Lawrence E Bassham
Abstract: Mars, RC6, Rijndael, Serpent and Twofish were selected as finalists for the Advanced Encryption Standard (AES). To evaluate the finalists' suitability as random number generators, empirical statistical testing is commonly employed. Although it widely ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151216

8. Efficiency Testing of ANSI C Implementations of Round1 Candidate Algorithms for the Advanced Encryption Standard
Report Number: 6391
Published: 10/1/1999
Author: Lawrence E Bassham
Abstract: The evaluation criteria for the Advanced Encryption Standard (AES) Round1 candidate algorithms, as specified in the Request for Comments (1), includes computional efficiency, among other criteria. Specifically, the Call For AES Candidate Algorithms ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151194

9. Security of SQL-Based Implementations of Product: Data Exchange Using Step
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5283
Published: 10/1/1993
Authors: Lawrence E Bassham, William T Polk
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900694

10. Security Issues in the Database Language SQL
Series: Special Publication (NIST SP)
Report Number: 800-8
Published: 8/2/1993
Authors: William T Polk, Lawrence E Bassham
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890091



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series