Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Lily Chen (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 25 of 31

Recommendation for Key Derivation Using Pseudorandom Functions

February 2, 2024
Author(s)
Lily Chen
This Recommendation specifies techniques for the derivation of additional keying material from a secret key—either established through a key-establishment scheme or shared through some other manner—using pseudorandom functions: HMAC, CMAC, and KMAC.

Digital Signature Standard (DSS)

February 2, 2023
Author(s)
Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson
This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed

Recommendation for Key Derivation Using Pseudorandom Functions

August 17, 2022
Author(s)
Lily Chen
This Recommendation specifies techniques for the derivation of additional keying material from a secret key—either established through a key-establishment scheme or shared through some other manner—using pseudorandom functions: HMAC, CMAC, and KMAC.

Guide to Bluetooth Security

January 19, 2022
Author(s)
John Padgette, John Bahr, Mayank Batra, Rhonda Smithbey, Lily Chen, Karen Scarfone
Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks (WPANs), and has been integrated into many types of business and consumer devices. This publication

Guidance for NIST Staff on Using Inclusive Language in Documentary Standards

April 29, 2021
Author(s)
Kathryn Miller, David F. Alderman, Lisa Carnahan, Lily Chen, James Foti, Barbara L. Goldstein, Michael Hogan, Jennifer Marshall, Karen Reczek, Nathalie Rioux, Mary Frances Theofanos, David A. Wollman
This document provides guidance to NIST staff regarding the use of inclusive language in documentary standards and documents which support the realization and dissemination of physical standards; Standards Developing Organizations' (SDOs) policies and

Post-Quantum Cryptography and 5G Security: Tutorial

May 15, 2019
Author(s)
T. Charles Clancy, Robert W. McGwier, Lidong Chen
The Fifth Generation (5G) mobile broadband standards make a fundamental shift in cryptography. Prior generations based their security and privacy principally on symmetric key cryptography. The Subscriber Identity Module (SIM) and its successors contain a

Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography

March 21, 2019
Author(s)
Elaine B. Barker, Lidong Chen, Allen L. Roginsky, Richard Davis, Scott Simon
This Recommendation specifies key-establishment schemes using integer factorization cryptography (in particular, RSA). Both key-agreement and key transport schemes are specified for pairs of entities, and methods for key confirmation are included to

Cryptography Standards in Quantum Time - New wine in old wineskin?

August 17, 2017
Author(s)
Lidong Chen
The National Institute of Standards and Technology (NIST) of the U.S. Government announced a call for proposals for quantum-resistant public-key cryptographic algorithms on December 15, 2016. The scope of the call covers all public-key cryptographic

Updated NIST Guidance for Bluetooth Security

July 26, 2017
Author(s)
Lidong Chen, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information in NIST SP 800-121, Revision 2: Guide to Bluetooth Security which provides information on the security capabilities of Bluetooth and provides recommendations to organizations employing Bluetooth wireless

Guide to Bluetooth Security

May 8, 2017
Author(s)
John Padgette, John Bahr, Mayank Batra, Marcel Holtmann, Rhonda Smithbey, Lidong Chen, Karen Scarfone
Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks (WPANs), and has been integrated into many types of business and consumer devices. This publication

A Secure Multicast Group Management and Key Distribution in IEEE 802.21

December 5, 2016
Author(s)
Yoshikazu Hanatani, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, Subir Das
Controlling a large number of devices such as sensors and smart end points, is always a challenge where scalability and security are indispensa-ble. This is even more critical when it comes to configuration updates to a large number of such devices when

Report on Post-Quantum Cryptography

April 28, 2016
Author(s)
Lidong Chen, Stephen P. Jordan, Yi-Kai Liu, Dustin Moody, Rene C. Peralta, Ray A. Perlner, Daniel C. Smith-Tone
In recent years, there has been a substantial amount of research on quantum computers - machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum

Report on Pairing-based Cryptography

February 3, 2015
Author(s)
Dustin Moody, Rene C. Peralta, Ray A. Perlner, Andrew R. Regenscheid, Allen L. Roginsky, Lidong Chen
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in

A New Standard for Securing Media-Independent Handover: IEEE 802.21a

December 31, 2013
Author(s)
Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE 802

Guide to Bluetooth Security

June 11, 2012
Author(s)
John Padgette, Lidong Chen, Karen Scarfone
[Superseded by SP 800-121 Rev. 2 (May 2017): http://www.nist.gov/manuscript-publication- search.cfm?pub_id=922974] Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless

Recommendation for Key Derivation through Extraction-then-Expansion

November 28, 2011
Author(s)
Lidong Chen
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure.