Routine used to generate a series of Round Keys from the Cipher Key.
Source(s):
FIPS 197
under Key Expansion
The second step in the key derivation procedure specified in this Recommendation to derive keying material with the desired length.
Source(s):
NIST SP 800-56C
[Superseded]
The second step in the key-derivation procedure in which a key-derivation key is used to derive secret keying material having the desired length(s). The first step in the procedure is randomness extraction.
Source(s):
NIST SP 800-133 Rev. 2