NIST logo

Publications Portal

You searched on:
Author: Quynh Dang

Displaying records 1 to 10 of 12 records.
Resort by: Date / Title


1. Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard
Published: 1/11/2013
Author: Quynh H Dang
Abstract: This paper describes the changes between FIPS 180-3 and FIPS 180-4. FIPS 180-4 specifies two new secure cryptographic hash algorithms: SHA-512/224 and SHA-512/256; it also includes a method for determining initial value(s) for any future SHA-512-base ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909563

2. Recommendation for Applications Using Approved Hash Algorithms
Series: Special Publication (NIST SP)
Report Number: 800-107 Rev 1
Published: 8/24/2012
Author: Quynh H Dang
Abstract: Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths wh ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911479

3. Secure Hash Standard (SHS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 180-4
Published: 3/6/2012
Author: Quynh H Dang
Abstract: This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. [Supersedes FIPS 180-3 (October 2008): http://www.nist.gov/m ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910977

4. Recommendation for Existing Application-Specific Key Derivation Functions
Series: Special Publication (NIST SP)
Report Number: 800-135 Rev 1
Published: 12/23/2011
Author: Quynh H Dang
Abstract: Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910283

5. Encryption Basics
Published: 5/2/2011
Authors: Kevin Mcguire Stine, Quynh H Dang
Abstract: Healthcare and health information technology professionals are entrusted with patient data which, because of its personal nature, requires protection to ensure its confidentiality. To provide this protection, these professionals frequently look to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908084

6. Recommendation for Existing Application-Specific Key Derivation Functions
Series: Special Publication (NIST SP)
Report Number: 800-135
Published: 12/23/2010
Author: Quynh H Dang
Abstract: [Superseded by NIST SP 800-135 Rev. 1, "Recommendation for Existing Application-Specific Key Derivation Functions" (December 2011), http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910283] Cryptographic keys are vital to the security o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907520

7. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt3
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and sec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903633

8. Randomized Hashing for Digital Signatures
Series: Special Publication (NIST SP)
Report Number: 800-106
Published: 2/25/2009
Author: Quynh H Dang
Abstract: NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in FIPS 180-3, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901182

9. Recommendation for Applications Using Approved Hash Algorithms
Series: Special Publication (NIST SP)
Report Number: 800-107
Published: 2/25/2009
Author: Quynh H Dang
Abstract: [Superseded by SP 800-107 Rev. 1 (August 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911479] Cryptographic hash functions that compute a fixed- length message digest from arbitrary length messages are widely used for many purp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901181

10. Secure Hash Standard (SHS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 180-3
Published: 10/31/2008
Authors: Elaine B Barker, Quynh H Dang
Abstract: [Superseded by FIPS 180-4 (March 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910977] This standard specifies five hash algorithms that can be used to generate digests of messages. The digests are used to detect whether message ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901372



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series