Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

Internet of Things (IoT) Cybersecurity Colloquium

Author(s)
Benjamin M. Piccarreta, Katerina N. Megas, Danna G. O'Rourke
This report provides an overview of the topics discussed at the “Internet of Things (IoT) Cybersecurity Colloquium” hosted on NIST’s campus in Gaithersburg

The 2017 IARPA Face Recognition Prize Challenge (FRPC)

Author(s)
Patrick J. Grother, Mei L. Ngan, Lars Ericson, Kayee K. Hanaoka, Christopher Boehnen
This report documents NIST’s execution of the Intelligence Advanced Research Projects Activity (IARPA) Face Recognition Prize Challenge 2017. The (FRPC) was

Cybersecurity Framework Manufacturing Profile

Author(s)
Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey A. Cichonski, John McCarthy
[Superseded by NISTIR 8183 (September 2017, Includes updates as of May 20, 2019)]This document provides the Cybersecurity Framework (CSF) implementation details

Industrial Wireless Systems Workshop Proceedings

Author(s)
Richard Candell
Background: Wireless technology has great appeals to many manufacturers, in this case industrial automation systems, which include process control, discrete

Report on Lightweight Cryptography

Author(s)
Kerry McKay, Lawrence E. Bassham, Meltem Sonmez Turan, Nicky Mouha
NIST-approved cryptographic standards were designed to perform well using general-purpose computers. In recent years, there has been increased deployment of
Was this page helpful?