Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: John Kelsey

Displaying records 1 to 10 of 22 records.
Resort by: Date / Title


1. Measuring the Usability and Security of Permuted Passwords on Mobile Platforms
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8040
Published: 4/25/2016
Authors: Kristen Greene, John M Kelsey, Joshua M Franklin
Abstract: Password entry on mobile devices significantly impacts both usability and security, but there is a lack of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength met ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919509

2. Predictive Models for Min-Entropy Estimation
Published: 9/13/2015
Authors: John M Kelsey, Kerry A McKay, Meltem Sonmez Turan
Abstract: Random numbers are essential for cryptography. In most real-world systems, these values come from a cryptographic pseudorandom number generator (PRNG), which in turn is seeded by an entropy source. The security of the entire cryptographic system then ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918415

3. Recommendation for Random Number Generation Using Deterministic Random Bit Generators
Series: Special Publication (NIST SP)
Report Number: 800-90A Rev 1
Published: 6/24/2015
Authors: Elaine B Barker, John M Kelsey
Abstract: This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions or block cipher algorithms. [Supersedes SP 800-90A (January 2012): http://www.nist.gov/man ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918489

4. New Second-Preimage Attacks on Hash Functions
Published: 6/23/2015
Authors: Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John M Kelsey, Adi Shamir, Sebastien Zimmer
Abstract: In this work, we present several new generic second-preimage attacks on hash functions. Our first attack is based on the herding attack and applies to various Merkle-Damgard-based iterative hash functions. Compared to the previously known long-messa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918851

5. Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
Published: 5/1/2015
Authors: Kristen Greene, Joshua M Franklin, John M Kelsey
Abstract: Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917995

6. How Random is Your RNG?
Published: 1/18/2015
Authors: Meltem Sonmez Turan, John M Kelsey, Kerry A McKay
Abstract: Cryptographic primitives need random numbers to protect your data. Random numbers are used for generating secret keys, nonces, random paddings, initialization vectors, salts, etc. Deterministic pseudorandom number generators are useful, but they stil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917957

7. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7896
Published: 11/15/2012
Authors: Shu-jen H Chang, Ray A Perlner, William Edward Burr, Meltem Sonmez Turan, John M Kelsey, Souradyuti Paul, Lawrence E Bassham
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms specified in the Federal Information Processing St ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912724

8. A Keyed Sponge Construction with Pseudorandomness in the Standard Model
Published: 3/22/2012
Authors: Dong H. Chang, Morris J Dworkin, Seokhie Hong, John M Kelsey, Mridul Nandi
Abstract: The sponge construction, designed by Bertoni, Daemen, Peeters, and Asscheis, is the framework for hash functions such as Keccak, PHOTON, Quark, and spongent. The designers give a keyed sponge construction by prepending the message with key and prove ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910823

9. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7764
Published: 2/23/2011
Authors: Meltem Sonmez Turan, Ray A Perlner, Lawrence E Bassham, William Edward Burr, Dong H. Chang, Shu-jen H Chang, Morris J Dworkin, John M Kelsey, Souradyuti Paul, Rene C Peralta
Abstract: The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information Pro ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907913

10. On the privacy threats of electronic poll books
Published: 10/4/2010
Authors: Stefan Popoveniuc, John M Kelsey
Abstract: Electronic poll books make the process of verifying that a voter is authorized to vote and issuing her a ballot faster and more convenient. However, they also introduce a privacy risk: if both the electronic poll book and voting machine or optical s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906172



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series