NIST logo

Publications Portal

You searched on:
Topic Area: Math
Sorted by: date

Displaying records 41 to 50 of 235 records.
Resort by: Date / Title


41. Reconstructing the past from imprecise knowledge of the present: Some examples of non uniqueness in solving parabolic equations backward in time.
Topic: Math
Published: 5/24/2012
Author: Alfred S Carasso
Abstract: Identifying sources of ground water pollution, and deblurring astronomical galaxy images, are two important applications generating growing interest in the numerical computation of parabolic equations backward in time. However, while backward uniquen ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908242

42. Applied and Computational Mathematics Division. Summary of Activities for Fiscal Year 2011
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7856
Topic: Math
Published: 5/18/2012
Author: Ronald F Boisvert
Abstract: This report summarizes the technical work of the Applied and Computational Sciences Division of NIST‰s Information Technology Laboratory.Part I (Overview) provides a high-level overview of the Division‰s activities, including highlights of technical ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910776

43. Isomorphism Classes of Edwards Curves over Finite Fields
Topic: Math
Published: 5/18/2012
Authors: Reza Farashahi, Dustin Moody, Hongfeng Wu
Abstract: Edwards curves are a new model for elliptic curves, which have attracted notice in cryptography. We give exact formulas for the number of F_q-isomorphism classes of Edwards curves and twisted Edwards curves. This answers a question recently asked ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908630

44. Improved Indifferentiability Security Bound for the JH Mode
Topic: Math
Published: 5/16/2012
Authors: Dustin Moody, Daniel C Smith-Tone, Souradyuti Paul
Abstract: Indi fferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function is one ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911448

45. Combinatorial Testing of ACTS: A Case Study
Topic: Math
Published: 4/21/2012
Authors: Mehra N. Borazjany, Linbin Yu, Yu Lei, Raghu N Kacker, David R Kuhn
Abstract: In this paper we present a case study of applying combinatorial testing to test a combinatorial test generation tool called ACTS. The purpose of this study is two-fold. First, we want to gain experience and insights about how to apply combinatorial t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911345

46. Isolating Failure-Inducing Combinations in Combinatorial Testing using Test Augmentation and Classification
Topic: Math
Published: 4/21/2012
Authors: Kiran Shakya, Tao Xie, Nuo Li, Yu Lei, Raghu N Kacker, David R Kuhn
Abstract: Combinatorial Testing (CT) is a systematic way of sampling input parameters of the software under test (SUT). A t-way combinatorial test set can exercise all behaviors of the SUT caused by interactions between t input parameters or less. Although com ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911450

47. Identifying Failure-Inducing Combinations in a Combinatorial Test Set
Topic: Math
Published: 4/17/2012
Author: Raghu N Kacker
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911457

48. Adaptive Preimage Resistance Analysis Revisited: Requirements, Subtleties and Implications
Topic: Math
Published: 4/16/2012
Authors: Dong H. Chang, Moti Yung
Abstract: In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906235

49. Improved Indifferentiability Security Bound for the JH Mode
Topic: Math
Published: 3/22/2012
Authors: Dustin Moody, Souradyuti Paul, Daniel C Smith-Tone
Abstract: The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably lo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910702

50. An Evaluation of Local Shape Descriptors for 3D Shape Retrieval
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7812
Topic: Math
Published: 3/8/2012
Author: Sarah Y. Tang
Abstract: As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. Most prominently, shape descriptors are used to describe the geometric and topological properties of objects and compared to determine t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909219



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series