Bibliography
For information about the AWS Key Management Service HSMs, go to the NIST Computer Security
Resource Center Cryptographic Module Validation Program search page
Amazon Web Services, General Reference (Version 1.0), “Signing AWS API Request,” http://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html.
Amazon Web Services, “What is the AWS Encryption SDK,” http://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html.
Federal Information Processing Standards Publications, FIPS PUB 180-4. Secure Hash Standard, August 2012. Available from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf
Federal Information Processing Standards Publication 197, Announcing the Advanced Encryption Standard (AES), November 2001. Available from http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Federal Information Processing Standards Publication 198-1, The Keyed-Hash Message Authentication Code (HMAC), July 2008. Available from http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf
NIST Special Publication 800-52 Revision 2, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, August 2019. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf
PKCS#1 v2.2: RSA Cryptography Standard (RFC 8017), Internet Engineering Task Force (IETF), November 2016. https://tools.ietf.org/html/rfc8017
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, NIST Special Publication 800-38D, November 2007. Available from http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices, NIST Special Publication 800-38E, January 2010. Available from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf
Recommendation for Key Derivation Using Pseudorandom Functions, NIST Special Publication 800-108, October 2009, Available from https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-108.pdf
Recommendation for Key Management - Part 1: General (Revision 5), NIST Special Publication 800-57A, May 2020, Available from https://doi.org/10.6028/NIST.SP.800-57pt1r5
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised), NIST Special Publication 800-56A Revision 3, April 2018. Available from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf
Recommendation for Random Number Generation Using Deterministic Random Bit Generators, NIST Special Publication 800-90A Revision 1, June 2015, Available from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf
SEC 2: Recommended Elliptic Curve Domain Parameters, Standards for Efficient Cryptography Group, Version 2.0, 27 January 2010.
Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), Brown, D., Turner, S., Internet Engineering Task Force, July 2010, http://tools.ietf.org/html/rfc5753/
X9.62-2005: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), American National Standards Institute, 2005.