NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 131 to 140 of 228 records.
Resort by: Date / Title


131. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70 Rev 2
Topic: Cybersecurity
Published: 2/25/2011
Authors: Stephen D Quinn, Murugiah P Souppaya, Melanie Cook, Karen Scarfone
Abstract: Special Publication 800-70 Revision 2 - National Checklist Program for IT Products Guidelines for Checklist Users and Developers describes security configuration checklists and their benefits, and it explains how to use the NIST National Checklist Pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732

132. New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/28/2008
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in a November 2007 Federal Register Notice. NIST is soliciting candidates for a new and robust cryptographic hash algorithm f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152172

133. O2 A-band line parameters to support atmospheric remote sensing. Part II: The rare isotopologues
Topic: Cybersecurity
Published: 7/21/2011
Authors: Joseph Terence Hodges, David A Long, Daniel K Havey, S. S. Yu, M Okumura, Charles E Miller
Abstract: Frequency-stabilized cavity ring-down spectroscopy (FS-CRDS) was employed to measure over 100 transitions in the R-branch of the b1Σg+←X3Σg-(0,0) band for the rare O2 isotopologues. The use of 17O- and 18O-enriched mixtures allowed fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907932

134. Of Passwords and People: Measuring the Effect of Password-Composition Policies
Topic: Cybersecurity
Published: 5/11/2011
Authors: Serge M. (Serge) Egelman, Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
Abstract: Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to guess, system administrators adopt password-composition policies (e.g., ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907615

135. On Hash Functions Using Checksums
Topic: Cybersecurity
Published: 4/1/2010
Authors: Praveen Gauruvarum, John M Kelsey, L. Knudsen, S. Thomsen
Abstract: We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum fun ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902682

136. On the Security of Hash Functions Employing Blockcipher Postprocessing
Topic: Cybersecurity
Published: 7/14/2011
Authors: Dong H. Chang, Mridul Nandi, Moti Yung
Abstract: Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton introduced the elegant notion of "Preimage Awareness" (PrA) of a hash function H^P ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907643

137. Optimizing Information Set Decoding Algorithms to Attack Cyclosymetric MDPC Codes
Topic: Cybersecurity
Published: 10/3/2014
Author: Ray A Perlner
Abstract: The most important drawback to code-based cryptography has historically been its large key sizes. Recently, several promising approaches have been proposed to reduce keysizes. In particular, significant keysize reduction has been achieved by using ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916132

138. PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85A-2
Topic: Cybersecurity
Published: 7/28/2010
Authors: Ramaswamy Chandramouli, Hildegard Ferraiolo, Ketan L Mehta
Abstract: The objective of this document is to provide test requirements and test assertions that could be used to validate the compliance/conformance of two PIV components: PIV middleware and PIV card application with the specification in NIST SP 800-73-3, In ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906167

139. Performance Measurement Guide for Information Security
Series: Special Publication (NIST SP)
Report Number: 800-55 Rev 1
Topic: Cybersecurity
Published: 7/16/2008
Authors: Elizabeth Chew, Marianne M. Swanson, Kevin Mcguire Stine, N Bartol, Anthony Brown, W Robinson
Abstract: This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional secur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152183

140. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201-1
Topic: Cybersecurity
Published: 6/26/2006
Authors: William I. MacGregor, Ketan Mehta
Abstract: [Superseded by FIPS 201-2(August 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914530] This document was developed to satisfy the requirements of HSPD-12, approved by the Secretary of Commerce, and issued on March 2006. This cha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series