E
Elaine B. Barker
Researcher at National Institute of Standards and Technology
Publications - 59
Citations - 8859
Elaine B. Barker is an academic researcher from National Institute of Standards and Technology. The author has contributed to research in topics: Key management & Cryptography. The author has an hindex of 32, co-authored 59 publications receiving 7917 citations.
Papers
More filters
ReportDOI
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
TL;DR: Some criteria for characterizing and selecting appropriate generators and some recommended statistical tests are provided, as a first step in determining whether or not a generator is suitable for a particular cryptographic application.
ReportDOI
Recommendation for Key Management, Part 1: General (Revision 3)
TL;DR: This Recommendation provides cryptographic key management guidance on policy and security planning requirements for U.S. government agencies and best practices for the management of cryptographic keying material.
SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Lawrence E. Bassham,Andrew L. Rukhin,Juan Soto,James R. Nechvatal,Miles E. Smid,Elaine B. Barker,Stefan D. Leigh,M. Levenson,Mark Vangel,David Banks,Nathanael A. Heckert,James F. Dray,San Vo +12 more
TL;DR: This paper discusses some aspects of selecting and testing random and pseudorandom number generators and their relation to cryptanalysis, and some recommended statistical tests are provided.
Book
Recommendation for Key Management - Part 1 General
TL;DR: This Recommendation provides cryptographic key management guidance on policy and security planning requirements for U.S. government agencies and best practices for the management of cryptographic keying material.
The Keyed-Hash Message Authentication Code (HMAC) | NIST
Elaine B. Barker,Quynh H. Dang +1 more
TL;DR: This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions, which can be used with any iterative FIPS-approved cryptographic hash function, in combination with a shared secret key.