Barker, E.
and Roginsky, A.
(2019),
Transitioning the use of cryptographic algorithms and key lengths:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.SP.800-131Ar2
(Accessed October 7, 2024)