Abstract
This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.
Users
Please
log in to take part in the discussion (add own reviews or comments).