Polk, W.
, Dodson, D.
, Burr, W.
, Ferraiolo, H.
and Cooper, D.
(2010),
Cryptographic algorithms and key sizes for personal identity verification:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.SP.800-78-3
(Accessed December 11, 2024)