Guide: Authentication Topic Cluster
Authentication
NIST FIPS 198 | The Keyed-Hash Message Authentication Code (HMAC) |
---|---|
NIST FIPS 196 | Entity Authentication Using Public Key Cryptography |
NIST FIPS 190 | Guideline for the Use of Advanced Authentication Technology Alternatives |
NIST FIPS 186-3 | Digital Signature Standard (DSS) |
NIST FIPS 181 | Automated Password Generator |
NIST FIPS 180-2 | Secure Hash Standard (SHS) |
NIST SP 800-89 | Recommendation for Obtaining Assurances for Digital Signature Applications |
NIST SP 800-63 | Recommendation for Electronic Authentication |
NIST SP 800-57 | Recommendation on Key Management |
NIST SP 800-38C | Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality |
NIST SP 800-38B | Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode |
NIST SP 800-38A | Recommendation for Block Cipher Modes of Operation - Methods and Techniques |
NIST SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure |
NIST SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication |
NIST SP 800-21 Rev 1 | Guideline for Implementing Cryptography in the Federal Government |
NIST SP 800-17 | Modes of Operation Validation System (MOVS): Requirements and Procedures |
NIST IR 7290 | Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation |
NIST IR 7206 | Smart Cards and Mobile Device Authentication: An Overview and Implementation |
NIST IR 7200 | Proximity Beacons and Mobile Handheld Devices: Overview and Implementation |
NIST IR 7046 | Framework for Multi-Mode Authentication: Overview and Implementation Guide |
NIST IR 7030 | Picture Password: A Visual Login Technique for Mobile Devices |
NIST SB 2005-09 | Biometric Technologies: Helping To Protect Information And Automated Transactions In Information Technology Systems |
NIST SB 2005-07 | Protecting Sensitive Information That Is Transmitted Across Networks: NIST Guidance For Selecting And Using Transport Layer Security Implementations |
NIST SB 2004-08 | Electronic Authentication: Guidance For Selecting Secure Techniques |
NIST SB 2003-03 | Security For Wireless Networks And Devices |
NIST SB 2001-05 | Biometrics - Technologies for Highly Secure Personal Authentication |
NIST SB 2001-03 | An Introduction to IPsec (Internet Protocol Security) |
Original source for tables: Guide to NIST Security Documents.