NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
NIST is starting two ambitious projects to (1) develop a taxonomy of software security flaws and vulnerabilities, (2) develop a taxonomy of software assurance (SA) functions and techniques which detect those flaws, (3) perform and maintain a survey of SA
This NIST Internal Report consists of two parts. Part A covers the planning, design, and specification of testing and reviewing the Software write block (SWB) support tools. Part B, which is a companion document, covers the test and code review support
This NIST Internal Report consists of two parts. Part A covers the planning, design, and specification of testing and reviewing the Software write block (SWB) support tools. Part B, which is a companion document, covers the test and code review support
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The goal of this document is to help W3C editors write better specifications, by making a specification easier to interpret without ambiguity and clearer as to what is required in order to conform. It focuses on how to define and specify conformance. It
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The goal of this document is to help W3C editors write better specifications, by making a specification easier to interpret without ambiguity and clearer as to what is required in order to conform. It focuses on how to define and specify conformance. It
The goal of this document is to help W3C editors write better specifications, by making a specification easier to interpret without ambiguity and clearer as to what is required in order to conform. It focuses on how to define and specify conformance. It
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
The IEEE Subcommittee on Pulse Techniques (SCOPT) of the Instrument and Measurement Society is developing a new standard for pulse analysis which yields pulse parameters such as amplitude, transition duration, overshoot, undershoot, pulse duration, and
Computer security assurance provides a basis for one to have confidence that security measures, both technical and operational, work as intended. Use of products with an appropriate degree of assurance contributes to security and assurance of the system as
W L. Gans, N. S. Nahman, J R. Andrews, E E. Baldwin
The techniques employed by NBS from the mid 70s through 1988 for the calibration of the pulse transition duration (TD) of a fast, step-like, electrical pulse generator are described along with the artifact requirements imposed on the pulse generator. The
William E. Anderson, Nile M. Oldham, Mark E. Parker
SIMnet is a computer network implemented in 1999 to facilitate international comparisons, and foster collaborations between national metrology laboratories in the Americas. The system employs standard hardware and a special network server to allow audio
We describe the effects of temperature on the performance of 20 GHz and 50 GHz digital sampling oscilloscopes and high speed pulse generators. The temperature of the sampling heads is varied through the manufacturer's specified minimum operating
Errors in the time-base of digital sampling oscilloscopes (samplers) will cause errors in the reported pulse parameters of the sampler-acquired waveforms and will also contribute to the uncertainty estimate for these parameters. We present the results of
X. Han, Gerard N. Stenbakken, F. J. Von Zuben, Hans Engler
This paper explores the neural network approach for empirical nonlinear error modeling. For systems that have a significant amount of nonlinearity, nonlinear error models require fewer parameters compared to linear models and require fewer test points to
The amplitude and bandwidth of kick-out pulses used in the nose-to-nose sampler impulse response characterization method were measured as a function of offset voltage. The amplitude is almost linear for offset voltages from -500 mV to 500 mV except for
The National Institute of Standards and Technology (NIST) Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) specifies the procedures involved in validating implementations of the Triple DES algorithm in ANSI X9.52 - 1998