M
Miles E. Smid
Researcher at National Institute of Standards and Technology
Publications - 26
Citations - 5363
Miles E. Smid is an academic researcher from National Institute of Standards and Technology. The author has contributed to research in topics: Key management & Public-key cryptography. The author has an hindex of 14, co-authored 26 publications receiving 4791 citations.
Papers
More filters
ReportDOI
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
TL;DR: Some criteria for characterizing and selecting appropriate generators and some recommended statistical tests are provided, as a first step in determining whether or not a generator is suitable for a particular cryptographic application.
ReportDOI
Recommendation for Key Management, Part 1: General (Revision 3)
TL;DR: This Recommendation provides cryptographic key management guidance on policy and security planning requirements for U.S. government agencies and best practices for the management of cryptographic keying material.
SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Lawrence E. Bassham,Andrew L. Rukhin,Juan Soto,James R. Nechvatal,Miles E. Smid,Elaine B. Barker,Stefan D. Leigh,M. Levenson,Mark Vangel,David Banks,Nathanael A. Heckert,James F. Dray,San Vo +12 more
TL;DR: This paper discusses some aspects of selecting and testing random and pseudorandom number generators and their relation to cryptanalysis, and some recommended statistical tests are provided.
SP 800-57. Recommendation for Key Management, Part 1: General (revised)
TL;DR: This Recommendation provides cryptographic key management guidance on policy and security planning requirements for U.S. government agencies and best practices for the management of cryptographic keying material.
SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
TL;DR: The asymmetric-key-based key agreement schemes in this Recommendation are based on the Diffie-Hellman (DH) and Menezes-Qu-Vanstone (MQV) algorithms and an asymmetric, key transport scheme is specified.