Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elaine B. Barker is active.

Publication


Featured researches published by Elaine B. Barker.


Journal of Research of the National Institute of Standards and Technology | 2001

Report on the Development of the Advanced Encryption Standard (AES)

James R. Nechvatal; Elaine B. Barker; Lawrence E. Bassham; William E. Burr; Morris J. Dworkin; James Foti; Edward Roback

In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST’s statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the cryptographic research community in analyzing the candidates. This analysis included an initial examination of the security and efficiency characteristics for each algorithm. NIST reviewed the results of this preliminary research and selected MARS, RC™, Rijndael, Serpent and Twofish as finalists. Having reviewed further public analysis of the finalists, NIST has decided to propose Rijndael as the Advanced Encryption Standard (AES). The research results and rationale for this selection are documented in this report.


Special Publication (NIST SP) - 800-90A Rev 1 | 2007

RECOMMENDATION FOR RANDOM NUMBER GENERATION USING DETERMINISTIC RANDOM BIT GENERATORS

Elaine B. Barker; John Kelsey

This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions, block cipher algorithms or number theoretic problems.


Journal of Research of the National Institute of Standards and Technology | 1999

Status Report on the First Round of the Development of the Advanced Encryption Standard

James R. Nechvatal; Elaine B. Barker; Donna F. Dodson; Morris J. Dworkin; James Foti; Edward Roback

In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST’s statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the cryptographic research community in analyzing the candidates. This analysis included an initial examination of the security and efficiency characteristics for each algorithm. NIST has reviewed the results of this research and selected five algorithms (MARS, RC6™, Rijndael, Serpent and Twofish) as finalists. The research results and rationale for the selection of the finalists are documented in this report. The five finalists will be the subject of further study before the selection of one or more of these algorithms for inclusion in the Advanced Encryption Standard.


Special Publication (NIST SP) - 800-130 | 2013

A Framework for Designing Cryptographic Key Management Systems

Elaine B. Barker; Miles E. Smid; Dennis K. Branstad; Santosh Chokhani

This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that need to be addressed by the design specification. Thus, any CKMS that addresses each of these requirements would have a design specification that is compliant with this Framework.


Special Publication (NIST SP) - 800-57 Pt3 Rev 1 | 2015

Recommendation for Key Management Part 3: Application-Specific Key Management Guidance

Elaine B. Barker; Quynh H. Dang

NIST Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.


Special Publication (NIST SP) - 800-57 Pt2 | 2014

Recommendation for Key Management - Part 2: Best Practices for Key Management Organization

Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid

Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.


Special Publication (NIST SP) - 800-22 Rev 1a | 2000

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

Andrew L. Rukhin; Juan Soto; James R. Nechvatal; Miles E. Smid; Elaine B. Barker


Special Publication (NIST SP) - 800-57 Pt1 | 2005

Recommendation for key management, part 1 :: general (revised)

Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid


Federal Inf. Process. Stds. (NIST FIPS) - 198-1 | 2002

The Keyed-Hash Message Authentication Code (HMAC) | NIST

Elaine B. Barker; Quynh H. Dang


Special Publication (NIST SP) - 800-56Ar3 | 2007

Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography

Elaine B. Barker; Lidong Chen; Allen L. Roginsky; Apostol T. Vassilev; Richard Davis

Collaboration


Dive into the Elaine B. Barker's collaboration.

Top Co-Authors

Avatar

Miles E. Smid

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

William C. Barker

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

William E. Burr

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Allen L. Roginsky

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

James R. Nechvatal

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

John Kelsey

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Lidong Chen

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Dennis K. Branstad

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew L. Rukhin

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Edward Roback

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge