NIST logo

Publications Portal

You searched on: Author: John Kelsey

Displaying records 1 to 10 of 19 records.
Resort by: Date / Title


1. How Random is Your RNG?
Published: 7/7/2015
Authors: Meltem Sonmez Turan, John M Kelsey, Kerry A McKay
Abstract: Cryptographic primitives need random numbers to protect your data. Random numbers are used for generating secret keys, nonces, random paddings, initialization vectors, salts, etc. Deterministic pseudorandom number generators are useful, but they stil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917957

2. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90A Rev 1
Published: 6/24/2015
Authors: Elaine B Barker, John M Kelsey
Abstract: This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions or block cipher algorithms. [Supersedes SP 800-90A (January 2012): http://www.nist.gov/man ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918489

3. Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
Published: 5/1/2015
Authors: Kristen Greene, Joshua M Franklin, John M Kelsey
Abstract: Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917995

4. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7896
Published: 11/15/2012
Authors: Shu-jen H Chang, Ray A Perlner, William Edward Burr, Meltem Sonmez Turan, John M Kelsey, Souradyuti Paul, Lawrence E Bassham
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms specified in the Federal Information Processing St ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912724

5. A Keyed Sponge Construction with Pseudorandomness in the Standard Model
Published: 3/22/2012
Authors: Dong H. Chang, Morris J Dworkin, Seokhie Hong, John M Kelsey, Mridul Nandi
Abstract: The sponge construction, designed by Bertoni, Daemen, Peeters, and Asscheis, is the framework for hash functions such as Keccak, PHOTON, Quark, and spongent. The designers give a keyed sponge construction by prepending the message with key and prove ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910823

6. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7764
Published: 2/23/2011
Authors: Meltem Sonmez Turan, Ray A Perlner, Lawrence E Bassham, William Edward Burr, Dong H. Chang, Shu-jen H Chang, Morris J Dworkin, John M Kelsey, Souradyuti Paul, Rene C Peralta
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information Pro ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907913

7. On the privacy threats of electronic poll books
Published: 10/4/2010
Authors: Stefan Popoveniuc, John M Kelsey
Abstract: Electronic poll books make the process of verifying that a voter is authorized to vote and issuing her a ballot faster and more convenient. However, they also introduce a privacy risk: if both the electronic poll book and voting machine or optical s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906172

8. Performance Requirements for End-to-End Verifiable Elections
Published: 8/9/2010
Authors: Stefan Popoveniuc, John M Kelsey, Andrew Richard Regenscheid, Poorvi Vora
Abstract: The term end-to-end verifiability has been used over the past several years to describe multiple voting system proposals. The term has, however, never been formally defined. As a result, its meaning tends to change from voting system to voting syst ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905908

9. On Hash Functions Using Checksums
Published: 4/1/2010
Authors: Praveen Gauruvarum, John M Kelsey, L. Knudsen, S. Thomsen
Abstract: We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum fun ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902682

10. Attacking Paper-Based E2E Voting Systems
Published: 2/1/2010
Authors: John M Kelsey, Andrew Richard Regenscheid, Tal Moran, David Chaum
Abstract: In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three end-to-end voting systems: Punchscan, Pret-a-Voter, and Threeballot. We also demonstrate ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901421



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series