NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 11 to 20 of 113 records.
Resort by: Date / Title


11. Optimizing Information Set Decoding Algorithms to Attack Cyclosymetric MDPC Codes
Topic: Cybersecurity
Published: 10/3/2014
Author: Ray A Perlner
Abstract: The most important drawback to code-based cryptography has historically been its large key sizes. Recently, several promising approaches have been proposed to reduce keysizes. In particular, significant keysize reduction has been achieved by using ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916132

12. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B Rev 1
Topic: Cybersecurity
Published: 10/1/2014
Authors: Elaine B Barker, Lidong Chen, Dustin Moody
Abstract: This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341

13. Guidelines for Smart Grid Cybersecurity
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7628 Rev 1
Topic: Cybersecurity
Published: 9/25/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of Smart Grid-related character ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916068

14. The Future of Cybersecurity Education
Topic: Cybersecurity
Published: 8/19/2014
Authors: Ernest Leroy McDuffie, V. P. Piotrowski
Abstract: By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917265

15. Release of NIST Interagency Report 7946, CVSS Implementation Guidance
Series: ITL Bulletin
Topic: Cybersecurity
Published: 7/10/2014
Authors: Harold Booth, Joshua M Franklin, Larry Feldman, Gregory A. Witte
Abstract: The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey severity and risk of information system vulnerabilities. CVSS was commissioned by the National Infrastructure Advisory Council (NIAC) in support of the global Vulne ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916242

16. Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 6/10/2014
Author: Ronald S Ross
Abstract: This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094

17. Supplemental Guidance on Ongoing Authorization: Transitioning to Near Real-Time Risk Management
Topic: Cybersecurity
Published: 6/3/2014
Authors: Kelley L Dempsey, Ronald S Ross, Kevin Mcguire Stine
Abstract: Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, int ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916095

18. NIST's Role in Improving Critical Infrastructure Cybersecurity: Public/Private Teamwork
Topic: Cybersecurity
Published: 6/2/2014
Author: William C Barker
Abstract: National security depends on the reliable functioning of critical infrastructures. Security mechanisms and controls for critical infrastructure protection aren‰t useful unless adopted, so NIST seeks, while fostering creation of effective cybersecuri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916056

19. Small and Medium-size Business Information Security Outreach Program
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/13/2014
Authors: Richard L Kissel, Kim Quill, Chris Johnson
Abstract: Small and medium-sized businesses (SMBs) represent 99.7 percent of all U.S. employers and are an important segment of the U.S. economy. These organizations, totaling more than 28.2 million, create over 60 percent of all new U.S. private-sector jobs a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916061

20. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series