LEADER 02023nam 2200481Ia 450 001 9910702131203321 005 20121001130350.0 024 8 $aGOVPUB-C13-0228032882d44bea7a2b8aa0c4f5d30a 035 $a(CKB)5470000002424828 035 $a(OCoLC)811563874 035 $a(OCoLC)927736003 035 $a(EXLCZ)995470000002424828 100 $a20121001d2011 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRecommendation for key derivation through extraction-then-expansion$b[electronic resource] /$fLily Chen 210 1$a[Gaithersburg, Md.] :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2011] 215 $a1 online resource (17 pages) 225 1 $aNIST special publication. ;$v800-56C.$aComputer security 300 $aTitle from PDF title screen (viewed Sept. 27, 2012). 300 $a"November 2011." 320 $aIncludes bibliographical references. 330 3 $aThis Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure. 517 3 $aRecommendation for key derivation through extraction then expansion 606 $aData encryption (Computer science)$xStandards$zUnited States 606 $aComputer security$xStandards$zUnited States 610 $aExpansion 610 $aExtraction 610 $aKey derivation 615 0$aData encryption (Computer science)$xStandards 615 0$aComputer security$xStandards 700 $aChen$b Lily$01396971 701 $aChen$b L$01406756 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910702131203321 996 $aRecommendation for key derivation through extraction-then-expansion$93486435 997 $aUNINA