NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Refrigerant working fluids have been predicted to be large contributors to the increase in radiative forcing of the earth. Consequently, existing compounds will
The National Institute of Standards and Technology coordinated an interlaboratory study for laboratories that use photoacoustic spectroscopy to measure and
The manufacturing atmosphere is continually changing with new technologies and standards being swiftly developed. Firms create competitive advantages using
This bulletin summarizes the information found in NIST SP 1800-6: Domain Name System-Based Electronic Mail Security, which describes a security platform for
New software, in the form of Microsoft Excel 2016 spreadsheets, has been created for the analysis and qualification of Charpy Verification Lots, to be used by
Frederic J. de Vaulx, Eric D. Simmon, Robert B. Bohn
With cloud computing in the mainstream, there is a preponderance of cloud based services in the market and the choices for consumers increase daily. However
Melanie Cook, Dragos Prisaca, Stephen D. Quinn, David A. Waltermire
This report defines the requirements and associated test procedures necessary for products or modules to achieve one or more Security Content Automation
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow
George W. Quinn, James R. Matey, Patrick J. Grother
Iris Exchange (IREX) IX is an evaluation of automated iris recognition algorithms. The first part of the evaluation is a performance test of both verification
The Software Assurance Reference Dataset (SARD) is a growing collection of over 170 000 programs with precisely located bugs. The programs are in C, C++, Java
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in
Elaine B. Barker, Lidong Chen, Allen L. Roginsky, Apostol T. Vassilev, Richard Davis
This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several
Celia Paulsen, Jon M. Boyens, Nadya Bartol, Kris Winkler
In the modern world, where complex systems and systems-of-systems are integral to the functioning of society and businesses, it is increasingly important to be
Over the past two years, the ODI has undertaken an ambitious effort to modernize the SRD Program. This report covers one aspect of this modernization effort, a
The new NIST database comes from the FBI which contains live-scan and rescanned ink images from deceased subjects. The database offers the user American
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National
The 2017 NIST/DHS/FDA Workshop: Standards for Pathogen Detection for Biosurveillance and Clinical Applications brought together subject matter experts from the