Recommendation for Key Management, Part 1: General (Revision 3)
暂无分享,去创建一个
William E. Burr | Elaine B. Barker | Miles E. Smid | Elaine B. Barker | William T. Polk | William C. Barker | M. Smid | W. Barker | W. Burr | W. Polk
[1] Joan Hash,et al. Techniques for System and Data Recovery , 2002 .
[2] Elaine B. Barker,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2007 .
[3] R. Ross,et al. Guide for the Security Certification And Accreditation of Federal Information Systems , 2004 .
[4] J. van Leeuwen,et al. STACS 99 , 1999, Lecture Notes in Computer Science.
[5] Shirley Radack,et al. Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems , 2004 .
[6] Policy,et al. Key Recovery Policy for the United States Department of Defense, Version 3.0 , 2003 .
[7] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[8] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[9] Elaine B. Barker,et al. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography , 2007 .
[10] Annabelle Lee,et al. Guideline for Implementing Cryptography in the Federal Government , 1999 .
[11] Elaine B. Barker,et al. Recommendation for Obtaining Assurances for Digital Signature Applications , 2006 .