Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

STEP File Analyzer and Viewer User Guide (Update 6)

Author(s)
Robert Lipman, Soonjo Kwon
The STEP File Analyzer and Viewer opens a STEP (ISO 10303 - STandard for Exchange of Product model data) Part 21 file and (1) generates a spreadsheet or CSV

Securing Web Transactions TLS Server Certificate Management

Author(s)
Murugiah P. Souppaya, William A. Haag Jr., Mehwish Akram, William C. Barker, Rob Clatterbuck, Brandon Everhart, Brian Johnson, Alexandros Kapasouris, Dung Lam, Brett Pleasant, Mary Raguso, Susan Symington, Paul Turner, Clint Wilson, Donna F. Dodson
Transport Layer Security (TLS) server certificates are critical to the security of both internet- facing and private web services. Despite the critical

Analysis of Iris Images from Twins Day – 2010

Author(s)
James R. Matey, Patrick J. Grother, George W. Quinn
Each year since 1976, the town of Twinsburg, Ohio has held a Twins Day Festival. Over the past 43 years over $77,000$ sets of twins and multiples have attended

NVLAP Carpet and Carpet Cushion

Author(s)
Timothy W. Rasinski
NIST Handbook 150-6 specifies the technical requirements and provides guidance for the accreditation of laboratories under the NVLAP Carpet and Carpet Cushion

Recommendation for Cryptographic Key Generation

Author(s)
Elaine B. Barker, Allen L. Roginsky, Richard Davis
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to

Guide to IPsec VPNs:

Author(s)
Elaine Barker, Quynh Dang, Sheila Frankel, Karen Scarfone, Paul Wouters

Securing web transactions TLS server certificate management:

Author(s)
Mehwish Akram, William C Barker, Rob Clatterbuck, Donna Dodson, Brandon Everhart, Jane Gilbert, William Haag, Brian Johnson, Alexandros Kapasouris, Dung Lam, Brett Pleasant, Mary Raguso, Murugiah Souppaya, Susan Symington, Paul Turner, Clint Wilson

IoT Device Cybersecurity Capability Core Baseline

Author(s)
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device
Was this page helpful?