NIST logo

Publications Portal

You searched on: Topic Area: Math Sorted by: date

Displaying records 21 to 30 of 100 records.
Resort by: Date / Title


21. Evolutionary Construction of de Bruijn Sequences
Topic: Math
Published: 7/20/2012
Author: Meltem Sonmez Turan
Abstract: A binary de Bruijn sequence of order n is a cyclic sequence of period 2^n, in which each n-bit pattern appears exactly once. These sequences are commonly used in applications such as stream cipher design, pseudo-random number generation, 3-D pattern ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909087

22. Combinatorial Testing of ACTS: A Case Study
Topic: Math
Published: 4/21/2012
Authors: Mehra N. Borazjany, Linbin Yu, Yu Lei, Raghu N Kacker, David R Kuhn
Abstract: In this paper we present a case study of applying combinatorial testing to test a combinatorial test generation tool called ACTS. The purpose of this study is two-fold. First, we want to gain experience and insights about how to apply combinatorial t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911345

23. Identifying Failure-Inducing Combinations in a Combinatorial Test Set
Topic: Math
Published: 4/17/2012
Author: Raghu N Kacker
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911457

24. Adaptive Preimage Resistance Analysis Revisited: Requirements, Subtleties and Implications
Topic: Math
Published: 4/16/2012
Authors: Dong H. Chang, Moti Yung
Abstract: In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906235

25. Improved Indifferentiability Security Bound for the JH Mode
Topic: Math
Published: 3/22/2012
Authors: Dustin Moody, Souradyuti Paul, Daniel C Smith-Tone
Abstract: The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably lo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910702

26. Light a Single Candle: Studying Supernovae
Topic: Math
Published: 3/1/2012
Authors: Dianne M O'Leary, Bert W Rust
Abstract: At peak luminosity, Type Ia supernovae can be even brighter than their parent galaxies, and their light curves display a very uniform and regular behavior. This makes them excellent candidates for a role as standard candles in measuring the distance ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910233

27. TABLE ERRATA for Magnus, Oberhettinger & Soni (1966): Formulas and Theorems for the Special Functions of Mathematical Physics
Topic: Math
Published: 2/16/2012
Author: Howard S Cohl
Abstract: A TABLE ERRATA is submitted concerning a formula in terms of a sum of two Gauss hypergeometric functions for Ferrers function of the second kind. This error occurs on p. 167 of Magnus, Oberhettinger & Soni (1966) Formulas and Theorems for the Special ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909311

28. Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach
Topic: Math
Published: 2/13/2012
Authors: Assane Gueye, Vladimir V Marbukh
Abstract: In this paper, we propose a quantification of the vulnerability of a communication network when links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between a net ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910926

29. Mean Value Formulas for Twisted Edwards Curves
Topic: Math
Published: 11/3/2011
Author: Dustin Moody
Abstract: R. Feng and H.Wu recently established a certain mean-value formula for the coordinates of the n-division points on an elliptic curve given inWeierstrass form (A mean value formula for elliptic curves, 2010, available at http://eprint.iacr.org/2009/58 ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907010

30. Bayesian uncertainty analysis for a regression model versus application of GUM Supplement 1 to the least-squares estimate
Topic: Math
Published: 5/5/2011
Authors: Blaza Toman, Clemens Elster
Abstract: Application of least-squares as, for instance, in curve fitting is an important tool of data analysis in metrology. It is tempting to employ the supplement 1 to the GUM (GUM-S1) to evaluate the uncertainty associated with the resulting parameter esti ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907685



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series