Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Guide to Using Vulnerability Naming Schemes

Author(s)
David A. Waltermire, Karen Scarfone
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration

Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

Author(s)
Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3

Security Considerations for Remote Electronic UOCAVA Voting

Author(s)
Nelson Hastings, Rene Peralta, Stefan Popoveniuc, Andrew Regenscheid
This whitepaper for the Technical Guidelines Development Committee (TGDC) identifies desirable security properties of remote electronic voting systems

Glossary of Key Information Security Terms

Author(s)
Richard L. Kissel
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800

Workshop on Bridging Satellite Climate Data Gaps

Author(s)
Catherine C. Cooksey, Raju V. Datla
Detecting the small signals of climate change for the most essential climate variables requires that satellite sensors make highly accurate and consistent

Internal Curing: A 2010 State-of-the-Art Review

Author(s)
Dale P. Bentz, Jason Weiss
The American Concrete Institute in 2010 defined internal curing as supplying water throughout a freshly placed cementitious mixture using reservoirs, via pre

Guide to Security for Full Virtualization Technologies

Author(s)
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to
Was this page helpful?