Threshold Schemes for Cryptographic Primitives - National Institute of Standards and Tech - Books - Createspace Independent Publishing Platf - 9781724402592 - July 26, 2018
In case cover and title do not match, the title is correct

Threshold Schemes for Cryptographic Primitives

National Institute of Standards and Tech

Price
A$ 30.49

Ordered from remote warehouse

Expected delivery Oct 15 - 29
Add to your iMusic wish list

Threshold Schemes for Cryptographic Primitives

NISTIR 8214 Released 1 March 2019 As cryptography becomes ubiquitous, it becomes increasingly relevant to address the potentially disastrous breakdowns resulting from differences between ideal and real implementations of cryptographic algorithms. These differences give rise to a range of attacks that exploit vulnerabilities in order to compromise diverse aspects of real-world implementations. Threshold schemes have the potential to enable secure modes of operation even when certain subsets of components are compromised. However, they also present new challenges for the standardization and validation of security assertions about their implementations. Why buy a book you can download for free? We print this book so you don't have to. First you gotta find a good clean (legible) copy and make sure it's the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure it's all there - including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If it's just a 10-page document, no problem, but if it's 250-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. It's much more cost-effective to just order the latest version from Amazon.com This book includes original commentary which is copyright material. Note that government documents are in the public domain. We print these large documents as a service so you don't have to. The books are compact, tightly-bound, full-size (8 1/2 by 11 inches), with large text and glossy covers. 4th Watch Publishing Co. is a SDVOSB. www.usgovpub.com If you like the service we provide, please leave positive review on Amazon.com.
Here are some other titles we publish on Amazon.com:
NIST SP 800-56A Pair-Wise Key-Establishment Schemes Using Discrete LogarithmCryptography
NIST SP 800-22 A Statistical Test Suite for Random and Pseudorandom NumberGenerators for Cryptographic Applications
NIST SP 800-67 Recommendation for the Triple Data Encryption Standard (TDEA) BlockCipher
NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices
NIST SP 800-130 A Framework for Designing Cryptographic Key Management Systems
NIST SP 800-131 Recommendation for Transitioning the Use of Cryptographic Algorithmsand Key Lengths
NIST SP 800-133 Recommendation for Cryptographic Key Generation
NIST SP 800-152 A Profile for U. S. Federal Cryptographic Key Management Systems
NIST SP 800-175 Guideline for Using Cryptographic Standards in the Federal Government
NISTIR 7977 NIST Cryptographic Standards and Guidelines Development Process
NISTIR 8105 Report on Post-Quantum Cryptography
NISTIR 8114 Report on Lightweight Cryptography
FIPS PUB 140-2 Security Requirements for Cryptographic Modules
FIPS PUB 197 Advanced Encryption Standard (AES), The Keyed-Hash MessageAuthentication Code (HMAC), Standards for Security Categorization of Federal Information andInformation Systems

Media Books     Paperback Book   (Book with soft cover and glued back)
Released July 26, 2018
ISBN13 9781724402592
Publishers Createspace Independent Publishing Platf
Pages 66
Dimensions 216 × 279 × 4 mm   ·   176 g
Language English  

Show all

More by National Institute of Standards and Tech