Routine used to generate a series of Round Keys from the Cipher Key.
Source(s):
FIPS 197
under Key Expansion
The second step in the key-derivation procedure in which a key-derivation key is used to derive secret keying material having the desired length(s). The first step in the procedure is randomness extraction.
Source(s):
NIST SP 800-133 Rev. 2
The second step in the key-derivation procedure specified in this Recommendation in which a key-derivation key is used to derive secret keying material having the desired length.
Source(s):
NIST SP 800-56C Rev. 2