Back to Results
First PageMeta Content
Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing


NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion
Add to Reading List

Document Date: 2012-02-06 15:01:52


Open Document

File Size: 314,20 KB

Share Result on Facebook

Company

Orion Security Solutions / AES / CBC / Securing Agency Information Systems / /

Facility

National Institute of Standards and Technology / /

IndustryTerm

cryptographic algorithms / security systems / /

Organization

National Institute of Standards and Technology / NIST SP / National Security Agency / U.S. Department of Commerce / office of Management and Budget / Institute of Standards and Technology Patrick D. Gallagher / /

Person

Allen Roginsky / Rosario Gennros / John Kelsey / John E. Bryson / Miles Smid / Lily Chen / Tim Polk / Tal Rabin / Sharon Keller / Quynh Dang / Patrick D. Gallagher / Elaine Barker / Hugo Krawczyk / Meltem Sonmez Turan / Johan HÃ¥stad / Yevgeniy Dodis / /

Position

author / Secretary of Commerce / Director / Director SP 800-56C / Acknowledgements The author / Under Secretary / Secretary of Commerce / Secretary / federal official / Extraction-then-Expansion Acknowledgements The author / /

ProgrammingLanguage

EC / /

PublishedMedium

Public Law / /

Technology

Encryption / cryptography / Information Technology / ASCII / block cipher / MAC algorithm / /

SocialTag