NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: date

Displaying records 11 to 20 of 255 records.
Resort by: Date / Title


11. Avoiding Catastrophes in Cyberspace through Smarter Testing: How to prevent Heartbleed-like disasters using readily available testing technologies
Topic: Cybersecurity
Published: 10/16/2014
Authors: Apostol T Vassilev, Christopher Celi
Abstract: The recently discovered Heartbleed bug in OpenSSL‰s implementation of Internet security protocols and the aftermath from dealing with its consequences highlights a critical problem in the software industry. Software is routinely, inadequately tested ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916849

12. A Cybersecurity Testbed for Industrial Control Systems
Topic: Cybersecurity
Published: 10/9/2014
Authors: Richard Candell, Keith A Stouffer, Dhananjay Anand
Abstract: The National Institute of Standards and Technology (NIST) is developing a cybersecurity testbed for industrial control systems (ICS). The goal of this testbed is to measure the performance of an ICS when instrumented with cybersecurity protections i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915876

13. Optimizing Information Set Decoding Algorithms to Attack Cyclosymetric MDPC Codes
Topic: Cybersecurity
Published: 10/3/2014
Author: Ray A Perlner
Abstract: The most important drawback to code-based cryptography has historically been its large key sizes. Recently, several promising approaches have been proposed to reduce keysizes. In particular, significant keysize reduction has been achieved by using ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916132

14. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B Rev 1
Topic: Cybersecurity
Published: 10/1/2014
Authors: Elaine B Barker, Lidong Chen, Dustin Moody
Abstract: This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341

15. Release of NIST Interagency Report 7628 Revision 1, Guidelines for Smart Grid Cybersecurity
Series: ITL Bulletin
Topic: Cybersecurity
Published: 9/29/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer, Larry Feldman, Gregory A. Witte
Abstract: The United States has embarked on a major transformation of its electric power infrastructure. This vast infrastructure upgrade--extending from homes and businesses to fossil-fuel-powered generating plants and wind farms--is central to national effor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917244

16. Guidelines for Smart Grid Cybersecurity
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7628 Rev 1
Topic: Cybersecurity
Published: 9/25/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of Smart Grid-related character ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916068

17. Computer Security Division 2013 Annual Report
Series: Special Publication (NIST SP)
Report Number: 800-170
Topic: Cybersecurity
Published: 9/4/2014
Authors: Patrick D O'Reilly, Gregory A. Witte, Chris Johnson, Doug Rike
Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915764

18. Single-shot security for one-time memories in the isolated qubits model
Topic: Cybersecurity
Published: 8/21/2014
Author: Yi-Kai Liu
Abstract: One-time memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915498

19. The Future of Cybersecurity Education
Topic: Cybersecurity
Published: 8/19/2014
Authors: Ernest Leroy McDuffie, V. P. Piotrowski
Abstract: By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917265

20. Release of NIST Interagency Report 7946, CVSS Implementation Guidance
Series: ITL Bulletin
Topic: Cybersecurity
Published: 7/10/2014
Authors: Harold Booth, Joshua M Franklin, Larry Feldman, Gregory A. Witte
Abstract: The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey severity and risk of information system vulnerabilities. CVSS was commissioned by the National Infrastructure Advisory Council (NIAC) in support of the global Vulne ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916242



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series