02023nam 2200481Ia 450 991070213120332120121001130350.0GOVPUB-C13-0228032882d44bea7a2b8aa0c4f5d30a(CKB)5470000002424828(OCoLC)811563874(OCoLC)927736003(EXLCZ)99547000000242482820121001d2011 ua 0engurbn|||||||||txtrdacontentcrdamediacrrdacarrierRecommendation for key derivation through extraction-then-expansion[electronic resource] /Lily Chen[Gaithersburg, Md.] :U.S. Dept. of Commerce, National Institute of Standards and Technology,[2011]1 online resource (17 pages)NIST special publication. ;800-56C.Computer securityTitle from PDF title screen (viewed Sept. 27, 2012)."November 2011."Includes bibliographical references.This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure.Recommendation for key derivation through extraction then expansionData encryption (Computer science)StandardsUnited StatesComputer securityStandardsUnited StatesExpansionExtractionKey derivationData encryption (Computer science)StandardsComputer securityStandardsChen Lily1396971Chen L1406756National Institute of Standards and Technology (U.S.)GPOGPOBOOK9910702131203321Recommendation for key derivation through extraction-then-expansion3486435UNINA