Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Journals

Standardization of Smart Grid Customer Interfaces

Author(s)
Steven T. Bushby, David G. Holmberg
One of the key concepts of a modernized “smart grid” is to combine modern communication technology with an improved electric grid to enable energy consumers to

Longitudinal Study of Fingerprint Recognition

Author(s)
Soweon Yoon, Anil Jain
Human identification by fingerprints is based on the fundamental premise that ridge patterns from distinct fingers are different (uniqueness) and a fingerprint

Sharp interface model of creep deformation in crystalline solids

Author(s)
Yuri Mishin, Geoffrey B. McFadden, Robert F. Sekerka, William J. Boettinger
We present a rigorous irreversible thermodynamics treatment of creep deformation of solid mate- rials with interfaces described as geometric surfaces capable of

High-dimensional hyperentanglement of mode-locked two-photon states

Author(s)
Zhenda Xie, Tian Zhong, Sajan Shrestha, XinAn Xu, Junlin Liang, Yan-Xiao Gong, Alessandro Restelli, Jeffrey Shapiro, Franco N. Wong, Chee Wei Wong, Joshua Bienfang
Quantum entanglement is the fundamental resource for quantum information processing and communications, including secure data rates with higher capacities and

New Second-Preimage Attacks on Hash Functions

Author(s)
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John M. Kelsey, Adi Shamir, Sebastien Zimmer
In this work, we present several new generic second-preimage attacks on hash functions. Our first attack is based on the herding attack and applies to various
Was this page helpful?