An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Dustin Moody, Daniel C. Smith-Tone, Souradyuti Paul
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function was one of the
NEURBT, a Fortran 77 program for computing neural networks for classification using batch learning, is discussed. NEURBT is based on Mφller's scaled conjugate gradient algorithm which is a variation of the traditional conjugate gradient method, better
Josef Sifuentes, Zydrunas Gimbutas, Leslie Greengard
We present a simple, accurate method for solving consistent, rank-deficient linear systems, with or without additional rank-completing constraints. Such problems arise in a variety of applications, such as the computation of the eigenvectors of a matrix
Dustin Moody, Rene C. Peralta, Ray A. Perlner, Andrew R. Regenscheid, Allen L. Roginsky, Lidong Chen
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NISTs position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in
Jose Torres Jimenez, Javier Bernal, Raghu N. Kacker
The bandwidth minimization problem on graphs (BMPG) consists of labeling the vertices of a graph with the integers from 1 to $n$ ($n$ is the number of vertices) such that the maximum absolute difference between labels of adjacent vertices is as small as
This paper discusses a two step enhancement technique applicable to noisy Helium Ion Microscope images in which background structures are not easily discernible due to a weak signal. The method is based on a preliminary adaptive histogram equalization
This paper proposes a neurobiology-based extension of integrate-and-fire models of Radial Basis Function Neural Networks (RBFNN) that adapts to novel stimuli by means of dynamic restructuring of the network's structural parameters. The new architecture
We derive eigenfunction expansions for a fundamental solution of Laplace's equation in three-dimensional Euclidean space in 5-cyclidic coordinates. There are three such expansions in terms of internal and external 5-cyclidic harmonics of first, second and
Dustin Moody, Ray A. Perlner, Daniel C. Smith-Tone
Historically, multivariate public key cryptography has been less than successful at offering encryption schemes which are both secure and efficient. At PQCRYPTO '13 in Limoges, Tao, Diene, Tang, and Ding introduced a promising new multivariate encryption
A Brahmagupta quadrilateral is a cyclic quadrilateral whose sides, diagonals, and area are all integer values. In this article, we characterize the notions of Brahmagupta, introduced by K. R. S. Sastry, by means of elliptic curves. Motivated by these
Isabel M. Beichl, Amanda A. Streib, Noah S. Streib, Francis Sullivan
A large portion of the complexity inherent to the Ising model can be captures with a trivial amount of computation. in this work, we support this claim by defining an approximation to the partition function and other thermodynamic quantities of the Ising
This report summarizes the technical work of the Applied and Computational Sciences Division of NISTs Information Technology Laboratory. Part I (Overview) provides a high-level overview of the Divisions activities, including highlights of technical
Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the