

Le traduzioni sono generate tramite traduzione automatica. In caso di conflitto tra il contenuto di una traduzione e la versione originale in Inglese, quest'ultima prevarrà.

# Bibliografia
<a name="kms-bibliography"></a>

<a name="fips-hsms"></a>**Per informazioni su AWS Key Management Service HSMs, vai alla [pagina di ricerca del NIST Computer Security Resource Center Cryptographic Module Validation Program e cerca](https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search) HSM.AWS Key Management Service **

Amazon Web Services, riferimento generale (versione 1.0), «Richiesta AWS API di firma», [http://docs.aws.amazon. com/general/latest/gr/signing](https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html)\$1aws\$1api\$1requests.html.

Amazon Web Services, «Cos'è» AWS Encryption SDK, [http://docs.aws.amazon. com/encryption-sdk/latest/developer-guide/introduction.html](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html).

Pubblicazioni di Federal Information Processing Standards, FIPS PUB 180-4. *Secure Hash Standard*, agosto 2012. Disponibile all'[indirizzo https://nvlpubs.nist. gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf). 

Federal Information Processing Standards Publication 197, *Announcing the Advanced Encryption Standard (AES)*, novembre 2001. [Disponibile all'indirizzo http://csrc.nist. gov/publications/fips/fips197/fips](http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf)-197.pdf.

Federal Information Processing Standards Publication 198-1, *The Keyed-Hash Message Authentication Code (HMAC)*, luglio 2008. Disponibile all'[indirizzo http://csrc.nist. gov/publications/fips/fips198-1/FIPS](http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf)-198-1\$1final.pdf.

Pubblicazione speciale NIST 800-52 Revisione 2, Linee guida per la selezione, la configurazione e l'uso delle implementazioni di Transport Layer Security (TLS), agosto 2019. [https://nvlpubs.nist. gov/nistpubs/SpecialPublications/NIST.SP.800-52R2.pdf](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf).

PKCS \$11 v2.2: *RSA Cryptography Standard (RFC 8017), Internet Engineering Task Force* (IETF), novembre 2016. [https://tools.ietf.org/html/rfc8017.](https://tools.ietf.org/html/rfc8017)

Raccomandazione per le modalità operative di cifratura a blocchi: Galois/Counter Mode (GCM) e GMAC, pubblicazione speciale del NIST 800-38D, novembre 2007. [Disponibile su http://csrc.nist. gov/publications/nistpubs/800-38D/SP](http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf)-800-38D.pdf.

*Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices*, NIST Special Publication 800-38E, gennaio 2010. Disponibile all'[indirizzo https://nvlpubs.nist. gov/nistpubs/Legacy/SP/nistspecialpublication](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf)800-38e.pdf.

*Raccomandazione per la derivazione delle chiavi utilizzando funzioni pseudocasuali*[, pubblicazione speciale del NIST 800-108, ottobre 2009, disponibile su https://nvlpubs.nist. gov/nistpubs/legacy/sp/nistspecialpublication800-108.pdf.](https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-108.pdf)

*Recommendation for Key Management - Part 1: General (Revision 5)*, NIST Special Publication 800-57A, maggio 2020, disponibile da [https://doi.org/10.6028/NIST.SP.800-57pt1r5](https://doi.org/10.6028/NIST.SP.800-57pt1r5).

*Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)*, NIST Special Publication 800-56A Revision 3 aprile 2018. Disponibile all'[indirizzo https://nvlpubs.nist. gov/nistpubs/SpecialPublications/NIST.sp.800-56AR3.pdf](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf).

*Raccomandazione per la generazione di numeri casuali utilizzando generatori di bit casuali deterministici*[, pubblicazione speciale NIST 800-90A Revisione 1, giugno 2015, disponibile su https://nvlpubs.nist. gov/nistpubs/SpecialPublications/NIST.SP.800-90AR1.pdf.](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf)

SEC 2: *Recommended Elliptic Curve Domain Parameters*, Standards for Efficient Cryptography Group, Version 2.0, 27 gennaio 2010. 

*Uso degli algoritmi di crittografia a curva ellittica (ECC) nella sintassi dei messaggi crittografici (CMS), Brown, D., Turner, S., Internet Engineering Task Force*[, luglio 2010, http://tools.ietf. org/html/rfc5753/.](https://datatracker.ietf.org/doc/html/rfc5753/)

*X9.62-2005: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)*, American National Standards Institute, 2005.