| SP 800-56C Rev. 2 | Recommendation for Key-Derivation Methods in Key-Establishment Schemes | Final | 08/18/2020 | 
                    
                        | SP 800-133 Rev. 2 | Recommendation for Cryptographic Key Generation | Final | 06/04/2020 | 
                    
                        | SP 800-57 Part 1 Rev. 5 | Recommendation for Key Management: Part 1 – General | Final | 05/04/2020 | 
                    
                        | SP 800-56C Rev. 2 (Draft) | Recommendation for Key-Derivation Methods in Key-Establishment Schemes | Draft | 03/24/2020 | 
                    
                        | SP 800-57 Part 1 Rev. 5 (Draft) | Recommendation for Key Management: Part 1 – General | Draft | 10/08/2019 | 
                    
                        | SP 800-133 Rev. 1 | Recommendation for Cryptographic Key Generation | Withdrawn | 07/23/2019 | 
                    
                        | SP 800-57 Part 2 Rev. 1 | Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations | Final | 05/23/2019 | 
                    
                        | SP 800-131A Rev. 2 | Transitioning the Use of Cryptographic Algorithms and Key Lengths | Final | 03/21/2019 | 
                    
                        | SP 800-56B Rev. 2 | Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography | Final | 03/21/2019 | 
                    
                        | SP 800-56A Rev. 3 | Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography | Final | 04/16/2018 | 
                    
                        | SP 800-56C Rev. 1 | Recommendation for Key-Derivation Methods in Key-Establishment Schemes | Withdrawn | 04/16/2018 | 
                    
                        | SP 800-57 Part 1 Rev. 4 | Recommendation for Key Management, Part 1: General | Withdrawn | 01/28/2016 | 
                    
                        | SP 800-152 | A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS) | Final | 10/28/2015 | 
                    
                        | SP 800-57 Part 3 Rev. 1 | Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance | Final | 01/22/2015 | 
                    
                        | ITL Bulletin | A Profile of the Key Management Framework for the Federal Government | Final | 01/09/2014 | 
                    
                        | SP 800-130 | A Framework for Designing Cryptographic Key Management Systems | Final | 08/15/2013 | 
                    
                        | White Paper | Summary of the Workshop on Cryptographic Key Management Systems (CKMS), National Institute of Standards and Technology, September 10-11, 2012 | Final | 01/10/2013 | 
                    
                        | SP 800-133 | Recommendation for Cryptographic Key Generation | Withdrawn | 12/21/2012 | 
                    
                        | ITL Bulletin | Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information | Final | 12/19/2012 | 
                    
                        | SP 800-38F | Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping | Final | 12/13/2012 | 
                    
                        | SP 800-135 Rev. 1 | Recommendation for Existing Application-Specific Key Derivation Functions | Final | 12/23/2011 | 
                    
                        | SP 800-132 | Recommendation for Password-Based Key Derivation: Part 1: Storage Applications | Final | 12/22/2010 | 
                    
                        | NISTIR 7609 | Cryptographic Key Management Workshop Summary -- June 8-9, 2009 | Final | 01/08/2010 | 
                    
                        | SP 800-108 | Recommendation for Key Derivation Using Pseudorandom Functions (Revised) | Final | 10/01/2009 | 
                    
                        | SP 800-57 Part 2 | Recommendation for Key Management, Part 2: Best Practices for Key Management Organization | Withdrawn | 08/25/2005 |