Recommendation for key derivation through extraction-then-expansion [[electronic resource] /] / Lily Chen |
Autore | Chen Lily |
Pubbl/distr/stampa | [Gaithersburg, Md.] : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2011] |
Descrizione fisica | 1 online resource (17 pages) |
Altri autori (Persone) | ChenL |
Collana | NIST special publication. ;Computer security |
Soggetto topico |
Data encryption (Computer science) - Standards - United States
Computer security - Standards - United States |
Soggetto non controllato |
Expansion
Extraction Key derivation |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Recommendation for key derivation through extraction then expansion |
Record Nr. | UNINA-9910702131203321 |
Chen Lily | ||
[Gaithersburg, Md.] : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2011] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Recommendation for key derivation using pseudorandom functions [[electronic resource] /] / Lily Chen |
Autore | Chen Lily |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2008] |
Descrizione fisica | 1 online resource (20 unnumbered pages) : illustrations |
Collana | NIST special publication ;Computer security |
Soggetto topico |
Information technology - Government policy - United States
Cryptography - Government policy - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910700233503321 |
Chen Lily | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Recommendation for key derivation using pseudorandom functions (revised) [[electronic resource] /] / Lily Chen |
Autore | Chen Lily |
Edizione | [Rev.] |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2009] |
Descrizione fisica | 1 online resource (21 unnumbered pages) : illustrations |
Collana | NIST special publication ;Computer security |
Soggetto topico |
Information technology - Government policy - United States
Cryptography - Government policy - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Recommendation for key derivation using pseudorandom functions |
Record Nr. | UNINA-9910700233703321 |
Chen Lily | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Report on post-quantum cryptography / / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone |
Autore | Chen Lily |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 |
Descrizione fisica | 1 online resource (15 pages) : illustrations (black and white) |
Altri autori (Persone) |
ChenLily
JordanStephen LiuYi-Kai MoodyDustin PeraltaRené PerlnerRay Smith-ToneDaniel |
Collana | NISTIR |
Soggetto topico |
Public key cryptography
Quantum computing |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910709596903321 |
Chen Lily | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|