

# Bibliography


<a name="fips-hsms"></a>For information about the AWS Key Management Service HSMs, go to the NIST Computer Security Resource Center [Cryptographic Module Validation Program search page](https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search) and search for **AWS Key Management Service HSM**.

Amazon Web Services, General Reference (Version 1.0), “Signing AWS API Request,” [http://docs.aws.amazon.com/general/latest/gr/signing\$1aws\$1api\$1requests.html](http://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html).

Amazon Web Services, “What is the AWS Encryption SDK,” [http://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html](http://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html).

Federal Information Processing Standards Publications, FIPS PUB 180-4. *Secure Hash Standard*, August 2012. Available from [https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf). 

Federal Information Processing Standards Publication 197, *Announcing the Advanced Encryption Standard (AES)*, November 2001. Available from [http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf](http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf).

Federal Information Processing Standards Publication 198-1, *The Keyed-Hash Message Authentication Code (HMAC)*, July 2008. Available from [http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1\$1final.pdf](http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf).

NIST Special Publication 800-52 Revision 2, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, August 2019. [https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf).

PKCS\$11 v2.2: *RSA Cryptography Standard* (RFC 8017), Internet Engineering Task Force (IETF), November 2016. [https://tools.ietf.org/html/rfc8017](https://tools.ietf.org/html/rfc8017).

Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, NIST Special Publication 800-38D, November 2007. Available from [http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf](http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf).

*Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices*, NIST Special Publication 800-38E, January 2010. Available from [https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf).

*Recommendation for Key Derivation Using Pseudorandom Functions*, NIST Special Publication 800-108, October 2009, Available from [https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-108.pdf](https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-108.pdf).

*Recommendation for Key Management - Part 1: General (Revision 5)*, NIST Special Publication 800-57A, May 2020, Available from [https://doi.org/10.6028/NIST.SP.800-57pt1r5](https://doi.org/10.6028/NIST.SP.800-57pt1r5).

*Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)*, NIST Special Publication 800-56A Revision 3, April 2018. Available from [https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf).

*Recommendation for Random Number Generation Using Deterministic Random Bit Generators*, NIST Special Publication 800-90A Revision 1, June 2015, Available from [https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf).

SEC 2: *Recommended Elliptic Curve Domain Parameters*, Standards for Efficient Cryptography Group, Version 2.0, 27 January 2010. 

*Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)*, Brown, D., Turner, S., Internet Engineering Task Force, July 2010, [http://tools.ietf.org/html/rfc5753/](https://datatracker.ietf.org/doc/html/rfc5753/).

*X9.62-2005: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)*, American National Standards Institute, 2005.