NIST logo

Publications Portal

You searched on: Author: John Kelsey

Displaying records 1 to 10 of 21 records.
Resort by: Date / Title


1. Predictive Models for Min-Entropy Estimation
Published: 9/13/2015
Authors: John M Kelsey, Kerry A McKay, Meltem Sonmez Turan
Abstract: Random numbers are essential for cryptography. In most real-world systems, these values come from a cryptographic pseudorandom number generator (PRNG), which in turn is seeded by an entropy source. The security of the entire cryptographic system then ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918415

2. How Random is Your RNG?
Published: 7/7/2015
Authors: Meltem Sonmez Turan, John M Kelsey, Kerry A McKay
Abstract: Cryptographic primitives need random numbers to protect your data. Random numbers are used for generating secret keys, nonces, random paddings, initialization vectors, salts, etc. Deterministic pseudorandom number generators are useful, but they stil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917957

3. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90A Rev 1
Published: 6/24/2015
Authors: Elaine B Barker, John M Kelsey
Abstract: This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions or block cipher algorithms. [Supersedes SP 800-90A (January 2012): http://www.nist.gov/man ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918489

4. New Second-Preimage Attacks on Hash Functions
Published: 6/23/2015
Authors: Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John M Kelsey, Adi Shamir, Sebastien Zimmer
Abstract: In this work, we present several new generic second-preimage attacks on hash functions. Our first attack is based on the herding attack and applies to various Merkle-Damgard-based iterative hash functions. Compared to the previously known long-messa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918851

5. Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
Published: 5/1/2015
Authors: Kristen Greene, Joshua M Franklin, John M Kelsey
Abstract: Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917995

6. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7896
Published: 11/15/2012
Authors: Shu-jen H Chang, Ray A Perlner, William Edward Burr, Meltem Sonmez Turan, John M Kelsey, Souradyuti Paul, Lawrence E Bassham
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms specified in the Federal Information Processing St ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912724

7. A Keyed Sponge Construction with Pseudorandomness in the Standard Model
Published: 3/22/2012
Authors: Dong H. Chang, Morris J Dworkin, Seokhie Hong, John M Kelsey, Mridul Nandi
Abstract: The sponge construction, designed by Bertoni, Daemen, Peeters, and Asscheis, is the framework for hash functions such as Keccak, PHOTON, Quark, and spongent. The designers give a keyed sponge construction by prepending the message with key and prove ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910823

8. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7764
Published: 2/23/2011
Authors: Meltem Sonmez Turan, Ray A Perlner, Lawrence E Bassham, William Edward Burr, Dong H. Chang, Shu-jen H Chang, Morris J Dworkin, John M Kelsey, Souradyuti Paul, Rene C Peralta
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information Pro ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907913

9. On the privacy threats of electronic poll books
Published: 10/4/2010
Authors: Stefan Popoveniuc, John M Kelsey
Abstract: Electronic poll books make the process of verifying that a voter is authorized to vote and issuing her a ballot faster and more convenient. However, they also introduce a privacy risk: if both the electronic poll book and voting machine or optical s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906172

10. Performance Requirements for End-to-End Verifiable Elections
Published: 8/9/2010
Authors: Stefan Popoveniuc, John M Kelsey, Andrew Richard Regenscheid, Poorvi Vora
Abstract: The term end-to-end verifiability has been used over the past several years to describe multiple voting system proposals. The term has, however, never been formally defined. As a result, its meaning tends to change from voting system to voting syst ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905908



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series