NIST logo

Publications Portal

You searched on:
Topic Area: Math
Sorted by: title

Displaying records 121 to 130 of 232 records.
Resort by: Date / Title


121. IPOG: A General Strategy for t-Way Software Testing
Topic: Math
Published: 3/29/2007
Authors: Yu Lei, Raghu N Kacker, David R Kuhn, Vadim Okun, James F Lawrence
Abstract: Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can also be caused by interactions involving more than two parameters. In t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50944

122. Identifying Failure-Inducing Combinations in a Combinatorial Test Set
Topic: Math
Published: 4/17/2012
Author: Raghu N Kacker
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911457

123. Improved Indifferentiability Security Bound for the JH Mode
Topic: Math
Published: 3/22/2012
Authors: Dustin Moody, Souradyuti Paul, Daniel C Smith-Tone
Abstract: The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably lo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910702

124. Improved Indifferentiability Security Bound for the JH Mode
Topic: Math
Published: 5/16/2012
Authors: Dustin Moody, Daniel C Smith-Tone, Souradyuti Paul
Abstract: Indi fferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function is one ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911448

125. Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier
Topic: Math
Published: 12/2/2012
Authors: Dustin Moody, Daniel C Smith-Tone, Souradyuti Paul
Abstract: A hash function secure in the indi fferentiability framework is able to resist all generic attacks. Such hash functions also play a crucial role in the security of the protocols that use hash functions as random functions. The rate of a hash mode is ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911449

126. Integral Operators and Delay Differential Equations
Topic: Math
Published: 10/1/2006
Authors: David E. Gilsinn, Florian A Potra
Abstract: We begin this expository essay by reviewing with examples what a typical engineer already knows about statistics. We then consider a central question in engineering decision making, i.e., given a computer simulation of high-consequence systems, how ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150015

127. Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report
Topic: Math
Published: 4/1/2014
Authors: Jon Hagar, David R Kuhn, Raghu N Kacker, Thomas Wissink
Abstract: This poster gives an overview of the experience of eight pilot projects, over two years, applying combinatorial testing in a large aerospace organization. While results varied across the different pilot projects, overall it was estimated that CT wou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915302

128. Isolating Failure-Inducing Combinations in Combinatorial Testing using Test Augmentation and Classification
Topic: Math
Published: 4/21/2012
Authors: Kiran Shakya, Tao Xie, Nuo Li, Yu Lei, Raghu N Kacker, David R Kuhn
Abstract: Combinatorial Testing (CT) is a systematic way of sampling input parameters of the software under test (SUT). A t-way combinatorial test set can exercise all behaviors of the SUT caused by interactions between t input parameters or less. Although com ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911450

129. Isomorphism Classes of Edwards Curves over Finite Fields
Topic: Math
Published: 5/18/2012
Authors: Reza Farashahi, Dustin Moody, Hongfeng Wu
Abstract: Edwards curves are a new model for elliptic curves, which have attracted notice in cryptography. We give exact formulas for the number of F_q-isomorphism classes of Edwards curves and twisted Edwards curves. This answers a question recently asked ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908630

130. Lattice Matching (LM)-Prevention of Inadvertent Duplicate Publications of Crystal Structures
Series: Journal of Research (NIST JRES)
Topic: Math
Published: 10/1/2002
Author: Alan D. Mighell
Abstract: Lattice-matching techniques have proved to be an extremely effective for the identification of unknown crystalline materials. A commonly employed lattice-matching strategy is based on matching the reduced cell of an unknown against a database of know ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=850672



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series