As used in this Recommendation, a multi-step process to derive secret keying material from a shared secret and other information.
Source(s):
NIST SP 800-56B Rev. 2
As used in this Recommendation, a two-step key-derivation method consisting of randomness extraction followed by key expansion.
Source(s):
NIST SP 800-133 Rev. 2
NIST SP 800-56C Rev. 2