Recommendation for key derivation through extraction-then-expansion [[electronic resource] /] / Lily Chen
| Recommendation for key derivation through extraction-then-expansion [[electronic resource] /] / Lily Chen |
| Autore | Chen Lily |
| Pubbl/distr/stampa | [Gaithersburg, Md.] : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2011] |
| Descrizione fisica | 1 online resource (17 pages) |
| Altri autori (Persone) | ChenL |
| Collana | NIST special publication. ;Computer security |
| Soggetto topico |
Data encryption (Computer science) - Standards - United States
Computer security - Standards - United States |
| Soggetto non controllato |
Expansion
Extraction Key derivation |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Recommendation for key derivation through extraction then expansion |
| Record Nr. | UNINA-9910702131203321 |
Chen Lily
|
||
| [Gaithersburg, Md.] : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2011] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Recommendation for key derivation using pseudorandom functions [[electronic resource] /] / Lily Chen
| Recommendation for key derivation using pseudorandom functions [[electronic resource] /] / Lily Chen |
| Autore | Chen Lily |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2008] |
| Descrizione fisica | 1 online resource (20 unnumbered pages) : illustrations |
| Collana | NIST special publication ;Computer security |
| Soggetto topico |
Information technology - Government policy - United States
Cryptography - Government policy - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910700233503321 |
Chen Lily
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2008] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Recommendation for key derivation using pseudorandom functions (revised) [[electronic resource] /] / Lily Chen
| Recommendation for key derivation using pseudorandom functions (revised) [[electronic resource] /] / Lily Chen |
| Autore | Chen Lily |
| Edizione | [Rev.] |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2009] |
| Descrizione fisica | 1 online resource (21 unnumbered pages) : illustrations |
| Collana | NIST special publication ;Computer security |
| Soggetto topico |
Information technology - Government policy - United States
Cryptography - Government policy - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Recommendation for key derivation using pseudorandom functions |
| Record Nr. | UNINA-9910700233703321 |
Chen Lily
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2009] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Report on post-quantum cryptography / / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone
| Report on post-quantum cryptography / / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone |
| Autore | Chen Lily |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 |
| Descrizione fisica | 1 online resource (15 pages) : illustrations (black and white) |
| Altri autori (Persone) |
ChenLily
JordanStephen LiuYi-Kai MoodyDustin PeraltaRené PerlnerRay Smith-ToneDaniel |
| Collana | NISTIR |
| Soggetto topico |
Public key cryptography
Quantum computing |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910709596903321 |
Chen Lily
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||