LEADER 01538nam 2200409Ia 450 001 9910702130903321 005 20121001132644.0 035 $a(CKB)5470000002424831 035 $a(OCoLC)811564712 035 $a(EXLCZ)995470000002424831 100 $a20121001d2011 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTransitions$b[electronic resource] $erecommendation for transitioning the use of crytographic algorithms and key lengths /$fElaine Barker and Allen Roginsky 210 1$a[Gaithersburg, MD] :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2011] 215 $a1 online resource (iv, 23 pages) 225 1 $aNIST special publication ;$v800-131A.$aComputer security 300 $aTitle from PDF title screen (viewed Sept. 27, 2012). 300 $a"January 2011." 320 $aIncludes bibliographical references. 517 $aTransitions 606 $aData encryption (Computer science)$xStandards$zUnited States 606 $aComputer security$xStandards$zUnited States 615 0$aData encryption (Computer science)$xStandards 615 0$aComputer security$xStandards 700 $aBarker$b Elaine B$01352386 701 $aRoginsky$b Allen$01402005 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910702130903321 996 $aTransitions$93471575 997 $aUNINA