Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Morris J. Dworkin is active.

Publication


Featured researches published by Morris J. Dworkin.


Journal of Research of the National Institute of Standards and Technology | 2001

Report on the Development of the Advanced Encryption Standard (AES)

James R. Nechvatal; Elaine B. Barker; Lawrence E. Bassham; William E. Burr; Morris J. Dworkin; James Foti; Edward Roback

In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST’s statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the cryptographic research community in analyzing the candidates. This analysis included an initial examination of the security and efficiency characteristics for each algorithm. NIST reviewed the results of this preliminary research and selected MARS, RC™, Rijndael, Serpent and Twofish as finalists. Having reviewed further public analysis of the finalists, NIST has decided to propose Rijndael as the Advanced Encryption Standard (AES). The research results and rationale for this selection are documented in this report.


Journal of Research of the National Institute of Standards and Technology | 1999

Status Report on the First Round of the Development of the Advanced Encryption Standard

James R. Nechvatal; Elaine B. Barker; Donna F. Dodson; Morris J. Dworkin; James Foti; Edward Roback

In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST’s statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the cryptographic research community in analyzing the candidates. This analysis included an initial examination of the security and efficiency characteristics for each algorithm. NIST has reviewed the results of this research and selected five algorithms (MARS, RC6™, Rijndael, Serpent and Twofish) as finalists. The research results and rationale for the selection of the finalists are documented in this report. The five finalists will be the subject of further study before the selection of one or more of these algorithms for inclusion in the Advanced Encryption Standard.


Archive | 2004

SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality

Morris J. Dworkin


Archive | 2007

SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC

Morris J. Dworkin


Special Publication (NIST SP) - 800-38E | 2010

SP 800-38E. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices

Morris J. Dworkin


NIST Interagency/Internal Report (NISTIR) - 7620 | 2009

Status report on the second round of the SHA-3 cryptographic hash algorithm competition

Meltem Sonmez Turan; Ray A. Perlner; Lawrence E. Bassham; William E. Burr; Dong H. Chang; Shu-jen H. Chang; Morris J. Dworkin; John Kelsey; Souradyuti Paul; Rene C. Peralta


The Third SHA-3 Candidate Conference | 2012

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Dong H. Chang; Morris J. Dworkin; Seokhie Hong; John M. Kelsey; Mridul Nandi


Archive | 2005

SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication

Morris J. Dworkin


Archive | 2010

SP 800-38A Addendum. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode

Morris J. Dworkin


Archive | 2001

SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques

Morris J. Dworkin

Collaboration


Dive into the Morris J. Dworkin's collaboration.

Top Co-Authors

Avatar

Edward Roback

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Elaine B. Barker

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

James Foti

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

James R. Nechvatal

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Lawrence E. Bassham

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

William E. Burr

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Donna F. Dodson

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

John Kelsey

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Ray A. Perlner

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Rene C. Peralta

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge