Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

NIST First Call for Multi-Party Threshold Schemes

Author(s)
Luis Teixeira D'Aguiar Norton Brandao, Rene Peralta
This document calls for public submissions of multi-party threshold schemes, and other related crypto-systems, to support the United States National Institute

Certification of Standard Reference Material® 1568c Rice Flour

Author(s)
Laura Wood, Charles Barber, Colleen Bryan Sallee, Monique Johnson, Shaun Kotoski, Stephen Long, Tomohiro Narukawa, Rick Paul, Nicholas Sharp, John Sieber, Maria Isabel Vega Martinez, James Yen, Lee Yu
The National Institute of Standards and Technology (NIST) SRM 1568c Rice Flour has value assignments for over 30 analytes, including arsenic species. This

Certification of Standard Reference Material 2921a

Author(s)
David Bunk, David Newton
The National Institute of Standards and Technology (NIST) Standard Reference Material® (SRM®) 2921a Human Cardiac Troponin Complex delivers a certified value

CBRS Sharing Ecosystem Assessment (SEA) Sensor Data Manual

Author(s)
Aric Sanders, Anthony Romaniello, Daniel Kuester, Todd Schumann, Adam Wunderlich
The purpose of the National Advanced Spectrum and Communications Test Network (NASCTN) Citizens Broadband Radio Service (CBRS) Sharing Ecosystem Assessment (SEA

Database of Diffusion MRI Brain Scans at 64 mT and 3 T

Author(s)
Andrew Dienstfrey, Zydrunas Gimbutas, Joe Chalfoun, Adele Peskin, Kalina Jordanova, Kathryn Keenan, Stephen Ogier
Low-field magnetic resonance imaging offers the promise to significantly increase access to in vivo soft tissue imaging. The technology is both portable and low

Considerations for Achieving Crypto Agility: Strategies and Practices

Author(s)
Elaine Barker, Lidong Chen, David Cooper, Dustin Moody, Andrew Regenscheid, Murugiah Souppaya, William Newhouse, Russell Housley, Sean Turner, William Barker, Karen Kent
Cryptographic (crypto) agility refers to the capabilities needed to replace and adapt cryptographic algorithms in protocols, applications, software, hardware

Integrating Cybersecurity and Enterprise Risk Management (ERM)

Author(s)
Stephen Quinn, Julie Anne Chua, Nahla Ivy, Robert Gardner, Karen Scarfone, Matthew Smith, Greg Witte
The increasing frequency, creativity, and severity of cybersecurity attacks means that all enterprises should ensure that cybersecurity risk is receiving

Validation in Forensic Science: Guiding Principles for the Collection and Use of Validation Data

Author(s)
Henry Swofford, Steven Lund, Barbara Guttman, Erica Romsos, Johannes Soons, Melissa Taylor, Hariharan Iyer, Peter Vallone, John Jones, Vincent Desiderio, John Butler, Sandra Koch, Robert Thompson, Gregory Fiumara, Edward Sisco, Kelly Sauerwein, Allison Getz, Robert Ramotowski
This document provides guidance to the forensic science community on method validation. Building on the definition of validation in ISO/IEC 17025, it explores

Certification of Standard Reference Material® 1947a: Great Lakes Fish Tissue

Author(s)
Carolyn Burdette, Kelsey Blevins, Ashley Russell, Colleen Bryan Sallee, Amy Cuthbertson, Debra Ellisor, Nathanael Heckert, Jennifer Hoguet, Kevin Huncik, Amanda Moors, Jennifer Ness, Jessica Reiner
Standard Reference Material (SRM) 1947a Great Lakes Fish Tissue is intended to be used in the evaluation of analytical methods for the determination of

Wind-Driven Fire Spread to a Structure from Composite Fences

Author(s)
Kathryn Butler, Erik Johnsson, Marco Fernandez, Shonali Nazare, Alexander Maranghides
Field observations show that combustible landscaping features are a common pathway leading fire spread directly to homes during wildland-urban interface (WUI)

Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management: Enhancing Internet Protocol-Based IoT Device and Network Security

Author(s)
Jeffrey Marron, Michael Fagan, Murugiah Souppaya, Paul Watrobski, Blaine Mulugeta, Susan Symington, Joshua Klosterman, Charles Rearick, Chelsea Deane, Dan Harkins, Danny Jump, Michael Richardson, Andy Dolan, Kyle Haefner, Craig Pratt, Darshak Thakore, Peter Romness, Tyler Baker, David Griego, Brecht Wyseur, Nick Allott, Alexandru Mereacre, Ashley Setter, Julien Delplancke, Steve Clark, Mike Dow, Steve Egerter, Karen Kent
Establishing trust between a network and an Internet of Things (IoT) device (as defined in NIST Internal Report 8425) prior to providing the device with the

Safeguarding International Science: Research Security Framework

Author(s)
Gregory Strouse, Claire Saundry, Timothy Wood, Philip Bennett, Mary Bedner, Jeremy Schultz
The U.S. science and research ecosystem retains its leadership by actively engaging with the global community through the conduct of mutually beneficial
Was this page helpful?