gptkbp:instance_of
|
gptkb:publishing_company
|
gptkbp:bfsLayer
|
3
|
gptkbp:bfsParent
|
gptkb:Federal_Information_Processing_Standards_Publication_186
|
gptkbp:addresses
|
security requirements
|
gptkbp:amended_by
|
gptkb:2015
|
gptkbp:contains
|
entropy sources
deterministic random bit generators
|
gptkbp:focuses_on
|
gptkb:building
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Special Publication 800-90 A
|
gptkbp:includes
|
appendices
|
gptkbp:is_adopted_by
|
international standards organizations
|
gptkbp:is_available_on
|
NIST website
|
gptkbp:is_cited_in
|
gptkb:NIST_Special_Publication_800-90_B
gptkb:NIST_Special_Publication_800-90_C
technical reports
security guidelines
academic research papers
|
gptkbp:is_designed_for
|
cryptographic applications
|
gptkbp:is_discussed_in
|
workshops
security conferences
|
gptkbp:is_evaluated_by
|
gptkb:NIST_Cryptographic_Module_Validation_Program
independent security auditors
|
gptkbp:is_part_of
|
gptkb:Company
gptkb:NIST_Special_Publication_series
information security standards
NIST's efforts in cybersecurity
|
gptkbp:is_referenced_in
|
gptkb:FIPS_140-2
gptkb:FIPS_186-4
government regulations
industry standards
|
gptkbp:is_related_to
|
data encryption
secure communications
key generation
NISTSP 800-131 A
NISTSP 800-22
randomness testing
|
gptkbp:is_supported_by
|
academic institutions
cryptographic community
|
gptkbp:is_used_by
|
government agencies
private sector organizations
|
gptkbp:is_used_in
|
gptkb:software_framework
hardware security modules
|
gptkbp:provides_information_on
|
gptkb:XMPP_Extension_Protocol
|
gptkbp:published_by
|
gptkb:NIST
|
gptkbp:released_in
|
gptkb:2012
|
gptkbp:updates
|
gptkb:NIST_Special_Publication_800-90_A_Revision_1
|