NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 151 to 160 of 230 records.
Resort by: Date / Title


151. Quantifying Network Topology Robustness Under Budget Constraints
Topic: Cybersecurity
Published: 6/24/2013
Authors: Assane Gueye, Aron Lazska
Abstract: To design robust network topologies that resist strategic attacks, one must first be able to quantify robustness. In a recent line of research, the theory of network blocking games has been used to derive robustness metrics for topologies. A netw ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912970

152. Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network
Topic: Cybersecurity
Published: 10/16/2009
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904044

153. Randomized Hashing for Digital Signatures
Series: Special Publication (NIST SP)
Report Number: 800-106
Topic: Cybersecurity
Published: 2/25/2009
Author: Quynh H Dang
Abstract: NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in FIPS 180-3, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901182

154. Randomness Testing of the Advanced Encryption Standard Finalist Candidates
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6483
Topic: Cybersecurity
Published: 4/1/2000
Authors: Juan Soto, Lawrence E Bassham
Abstract: Mars, RC6, Rijndael, Serpent and Twofish were selected as finalists for the Advanced Encryption Standard (AES). To evaluate the finalists' suitability as random number generators, empirical statistical testing is commonly employed. Although it widely ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151216

155. Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit
Topic: Cybersecurity
Published: 2/3/2014
Authors: Chung Tong Hu, Karen Scarfone
Abstract: Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915399

156. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode (NIST SP 800-38A)
Series: Special Publication (NIST SP)
Report Number: 800-38
Topic: Cybersecurity
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929

157. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Topic: Cybersecurity
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901593

158. Recommendation for Key Derivation Using Pseudorandom Functions
Series: Special Publication (NIST SP)
Report Number: 800-108
Topic: Cybersecurity
Published: 11/12/2008
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900147

159. Recommendation for Key Derivation through Extraction-then-Expansion
Series: Special Publication (NIST SP)
Report Number: 800-56C
Topic: Cybersecurity
Published: 11/28/2011
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909679

160. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt1 Rev 3
Topic: Cybersecurity
Published: 7/10/2012
Authors: Elaine B Barker, William C Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides ba ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910342



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series