Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: Morris Dworkin

Displaying records 1 to 10 of 20 records.
Resort by: Date / Title


1. New NIST Security Standard Can Protect Credit Cards, Health Information
Series: ITL Bulletin
Report Number: April 2016
Published: 4/14/2016
Authors: Morris J Dworkin, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-38G, "Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption." The publication specifies two methods for format-preserving ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920780

2. Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
Series: Special Publication (NIST SP)
Report Number: 800-38G
Published: 3/29/2016
Author: Morris J Dworkin
Abstract: This Recommendation specifies two methods, called FF1 and FF3, for format-preserving encryption. Both of these methods are modes of operation for an underlying, approved symmetric-key block cipher algorithm.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920356

3. Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection
Series: ITL Bulletin
Published: 9/24/2015
Authors: Morris J Dworkin, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in FIPS 202. The publication specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the KECCAK algorithm that NIST s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919417

4. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 202
Published: 8/4/2015
Author: Morris J Dworkin
Abstract: This Standard specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the KECCAK algorithm that NIST selected as the winner of the SHA-3 Cryptographic Hash Algorithm Com ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919061

5. Analysis of VAES3 (FF2)
Published: 4/2/2015
Authors: Morris J Dworkin, Ray A Perlner
Abstract: The National Institute of Standards and Technology (NIST) specified three methods for format-preserving encryption (FPE) in Draft NIST Special Publication (SP) 800-38G, which was released for public comment in July, 2013. Each method was a mode of op ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917829

6. Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping
Series: Special Publication (NIST SP)
Report Number: 800-38F
Published: 12/13/2012
Author: Morris J Dworkin
Abstract: This publication describes cryptographic methods that are approved for "key wrapping," i.e., the protection of the confidentiality and integrity of cryptographic keys. In addition to describing existing methods, this publication specifies two new ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912048

7. A Keyed Sponge Construction with Pseudorandomness in the Standard Model
Published: 3/22/2012
Authors: Dong H. Chang, Morris J Dworkin, Seokhie Hong, John M Kelsey, Mridul Nandi
Abstract: The sponge construction, designed by Bertoni, Daemen, Peeters, and Asscheis, is the framework for hash functions such as Keccak, PHOTON, Quark, and spongent. The designers give a keyed sponge construction by prepending the message with key and prove ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910823

8. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7764
Published: 2/23/2011
Authors: Meltem Sonmez Turan, Ray A Perlner, Lawrence E Bassham, William Edward Burr, Dong H. Chang, Shu-jen H Chang, Morris J Dworkin, John M Kelsey, Souradyuti Paul, Rene C Peralta
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information Pro ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907913

9. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
Series: Special Publication (NIST SP)
Report Number: 800-38A Addendum
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929

10. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
Series: Special Publication (NIST SP)
Report Number: 800-38E
Published: 1/18/2010
Author: Morris J Dworkin
Abstract: This document approves the XTS-AES mode of the AES algorithm by reference to IEEE Std 1619-2007, subject to one additional requirement, as an option for protecting the confidentiality of data on storage devices. The mode does not provide authenticat ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904691



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series