Recommendation for cryptographic key generation
暂无分享,去创建一个
[1] Of references. , 1966, JAMA.
[2] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[3] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[4] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[5] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[6] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[7] Elaine B. Barker,et al. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography , 2007 .
[8] Elaine B. Barker,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2007 .
[9] Lidong Chen,et al. Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .
[10] Quynh H. Dang,et al. Recommendation for Applications Using Approved Hash Algorithms , 2009 .
[11] William E. Burr,et al. Recommendation for Password-Based Key Derivation Part 1: Storage Applications , 2010 .
[12] Quynh H. Dang,et al. Recommendation for Existing Application-Specific Key Derivation Functions , 2010 .
[13] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .
[14] Sedat Akleylek,et al. Security requirements for cryptographic modules , 2013 .
[15] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[16] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[17] Shu-jen H. Chang,et al. SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash , 2016 .
[18] John Kelsey,et al. Recommendation for Random Bit Generator (RBG) Constructions , 2016 .
[19] John Kelsey,et al. Recommendation for the Entropy Sources Used for Random Bit Generation , 2018 .
[20] Elaine B. Barker,et al. Recommendation for Key Establishment Using Symmetric Block Ciphers , 2018 .
[21] Elaine B. Barker,et al. Recommendation for Key-Derivation Methods in Key-Establishment Schemes , 2018 .
[22] Elaine B. Barker,et al. Transitioning the use of cryptographic algorithms and key lengths , 2011 .
[23] Elaine B. Barker,et al. Recommendation for pair-wise key establishment using integer factorization cryptography , 2019 .