Date Published: August 2012
Supersedes: SP 800-107 (February 2009)
Keywords Digital signatures; hash algorithms; cryptographic hash function; hash function; hash-based key derivation algorithms; hash value; HMAC; message digest; randomized hashing; random number generation; SHA; truncated hash values.
Identification and Authentication;
System and Communications Protection;
System and Information Integrity;