Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Investigation of PMU Response to Leap Second: 2015

Author(s)
Allen R. Goldstein, Dhananjay Anand, YaShian Li-Baboud
Between 22:30:00 June 30, 2015, and 00:30:00 July 2, 2015, UTC, the National Institute of Standards and Technology (NIST) tested eight Phasor Measurement Units

Computer Security Division 2014 Annual Report

Author(s)
Patrick D. O'Reilly, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public

Technical Basis for User Interface Design of Health IT

Author(s)
Michael E. Wiklund, Jonathan Kendler, Limor Hochberg, Matthew B. Weinger
This document is intended to help EHR developers plan and implement a user-centered design for their EHR systems. It includes user interface design principles

Results of barrier fabrics tested in an inverted configuration

Author(s)
Rick D. Davis, Shonali Nazare, Szabolcs Matko, William M. Pitts, Mauro Zammarano
The document will be used to facilitate discussions between California Bureau of Electronics and Appliance Repair, Home Furnishings, and Thermal Insulation

Secure Hash Standard

Author(s)
National Institute of Standards and Technology (NIST), Quynh Dang
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed
Was this page helpful?