NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 161 to 170 of 240 records.
Resort by: Date / Title


161. Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit
Topic: Cybersecurity
Published: 2/3/2014
Authors: Chung Tong Hu, Karen Scarfone
Abstract: Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915399

162. Recommendation for Block Cipher Modes of Operation Methods and Techniques
Series: Special Publication (NIST SP)
Report Number: 800-38A
Topic: Cybersecurity
Published: 12/1/2001
Author: Morris J Dworkin
Abstract: This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CT ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51031

163. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
Series: Special Publication (NIST SP)
Report Number: 800-38B
Topic: Cybersecurity
Published: 5/1/2005
Author: Morris J Dworkin
Abstract: This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity, and, hence, the integrity, o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50211

164. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
Series: Special Publication (NIST SP)
Report Number: 800-38A Addendum
Topic: Cybersecurity
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929

165. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
Series: Special Publication (NIST SP)
Report Number: 800-38D
Topic: Cybersecurity
Published: 11/28/2007
Author: Morris J Dworkin
Abstract: This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51288

166. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007]
Series: Special Publication (NIST SP)
Report Number: 800-38C
Topic: Cybersecurity
Published: 5/1/2004
Author: Morris J Dworkin
Abstract: This Recommendation defines a mode of operation, called Counter with Cipher Block Chaining-Message Authentication Code (CCM), for a symmetric key block cipher algorithm. CCM may be used to provide assurance of the confidentiality and the authenticity ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150447

167. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
Series: Special Publication (NIST SP)
Report Number: 800-38E
Topic: Cybersecurity
Published: 1/18/2010
Author: Morris J Dworkin
Abstract: This document approves the XTS-AES mode of the AES algorithm by reference to IEEE Std 1619-2007, subject to one additional requirement, as an option for protecting the confidentiality of data on storage devices. The mode does not provide authenticat ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904691

168. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Topic: Cybersecurity
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901593

169. Recommendation for Key Derivation Using Pseudorandom Functions
Series: Special Publication (NIST SP)
Report Number: 800-108
Topic: Cybersecurity
Published: 11/12/2008
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900147

170. Recommendation for Key Derivation through Extraction-then-Expansion
Series: Special Publication (NIST SP)
Report Number: 800-56C
Topic: Cybersecurity
Published: 11/28/2011
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909679



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series