Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1151 - 1175 of 1509

Personal Identity Verification Demonstration Summary

August 31, 2006
Author(s)
Erika McCallister, Hildegard Ferraiolo
This paper provides a summary of the NIST Personal Identity Verification (PIV) Demonstration. The PIV Demonstration took place from May 15 to June 14, 2006. Forty-four companies voluntarily participated through a Cooperative Research and Development

Concrete Multiplicative Complexity of Symmetric Functions

August 1, 2006
Author(s)
Joan Boyar, Rene Peralta
The multiplicative complexity of a Boolean function f is defined as the minimum number of binary conjunction (AND) gates required to construct a circuit representing f, when only exclusive-or, conjunction and negation gates may be used. This article

5th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings

July 18, 2006
Author(s)
William T. Polk, Nelson E. Hastings, Kent Seamons
NIST hosted the fifth annual Public Key Infrastructure (PKI) Research Workshop on April 4-6, 2006. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public key

Power Control in Multihop CSMA

June 1, 2006
Author(s)
Hamid Gharavi, Bo Yan
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Protecting Sensitive Information Transmitted in Public Networks

April 21, 2006
Author(s)
Shirley M. Radack
This bulletin summarizes NIST SP 800-77, Guide to IPsec VPNs, which was issued by NIST to help network architects, network administrators, security staff, technical support staff, and computer security program managers who are responsible for the technical

Cryptographic Hash Standards ? Where Do We Go From Here?

April 1, 2006
Author(s)
William E. Burr
The two most commonly used cryptographic hash functions, MD5 and SHA-1, have been successfully attacked?it is no longer advisable to use them in some applications, although other applications are not affected. Furthermore, these attacks have triggered a

Prevailing Over Wires in Healthcare Environments: Benefits and Challenges

April 1, 2006
Author(s)
David E. Cypher, Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
The objectives of this article are to survey the benefits and challenges that poise the deployment and operation of wireless communications in support of healthcare networks. While the main advantages of wireless communications remain to provide ubiquitous

Collisions and Near-Collisions for Reduced-Round Tiger

March 1, 2006
Author(s)
John M. Kelsey, Stefan Lucks
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. This extends to a collision-finding attack on 17 rounds of the Tiger hash function in time of about 249

Minimum Security Requirements for Federal Information and Information Systems

March 1, 2006
Author(s)
National Institute of Standards and Technology (NIST), Ronald S. Ross, Stuart W. Katzke, L A. Johnson
FIPS 200 is the second standard that was specified by the Federal Information Security Management Act (FISMA). It is an integral part of the risk management framework that the National Institute of Standards and Technology (NIST) has developed to assist
Was this page helpful?