NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 121 to 130 of 221 records.
Resort by: Date / Title


121. NIST SP 800-56A: Recommendation for Pair-Wise Key Establishment Using Discrete Logarithm Cryptography (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-56
Topic: Cybersecurity
Published: 3/14/2007
Authors: Elaine B Barker, Don Johnson, Miles E. Smid
Abstract: This Recommendation provides the specifications of key establishment schemes that are appropriate for use by the U.S. Federal Government, based on standards developed by the Accredited Standards Committee (ASC) X9, Inc.: American National Standard (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150618

122. NIST SP 800-56B: Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56
Topic: Cybersecurity
Published: 8/28/2009
Authors: Elaine B Barker, Lidong Chen, Andrew Richard Regenscheid, Miles E. Smid
Abstract: This recommendation specifies key establishment schemes using integer factorization cryptography, based on ANS X9 44, Key Establishment Using Integer Factorization Cryptography, which was developed by the Accredited Standards Committee (ASC) X9, Inc. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903082

123. NIST SP 800-56C: Recommendation for Key Derivation through Extraction-then-Expansion
Series: Special Publication (NIST SP)
Report Number: 800-56
Topic: Cybersecurity
Published: 11/28/2011
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909679

124. NIST SP 800-85A-2: PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85
Topic: Cybersecurity
Published: 7/28/2010
Authors: Ramaswamy Chandramouli, Hildegard Ferraiolo, Ketan L Mehta
Abstract: The objective of this document is to provide test requirements and test assertions that could be used to validate the compliance/conformance of two PIV components: PIV middleware and PIV card application with the specification in NIST SP 800-73-3, In ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906167

125. NIST Test Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7870
Topic: Cybersecurity
Published: 7/12/2012
Author: David A Cooper
Abstract: In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of test PIV Cards and a supporting public key infrastructure. This set of test cards includes ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911544

126. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537

127. NIST to Develop a Cybersecurity Framework to Protect Critical Infrastructure
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/21/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin describes the Cybersecurity Framework that NIST is developing to reduce cyber risks to our nation's critical infrastructure and announces the first Cybersecurity Framework Workshop.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913588

128. NIST's Role in Improving Critical Infrastructure Cybersecurity: Public/Private Teamwork
Topic: Cybersecurity
Published: 6/2/2014
Author: William C Barker
Abstract: National security depends on the reliable functioning of critical infrastructures. Security mechanisms and controls for critical infrastructure protection aren‰t useful unless adopted, so NIST seeks, while fostering creation of effective cybersecuri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916056

129. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70R1
Topic: Cybersecurity
Published: 9/30/2009
Authors: Stephen D Quinn, Karen Ann Scarfone, Murugiah P Souppaya
Abstract: A security configuration checklist is a series of instructions for configuring a product to a particular operational environment. Checklists can comprise templates or automated scripts, patches or patch descriptions, XML files, and other procedures. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901337

130. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70rev2
Topic: Cybersecurity
Published: 2/25/2011
Authors: Stephen D Quinn, Karen Scarfone, Melanie Cook, Murugiah P Souppaya
Abstract: Special Publication 800-70 Revision 2 - National Checklist Program for IT Products Guidelines for Checklist Users and Developers describes security configuration checklists and their benefits, and it explains how to use the NIST National Checklist Pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series