An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This report summarizes the technical work of the Applied and Computational Sciences Division of NISTs Information Technology Laboratory.Part I (Overview) provides a high-level overview of the Divisions activities, including highlights of technical
Edwards curves are a new model for elliptic curves, which have attracted notice in cryptography. We give exact formulas for the number of F_q-isomorphism classes of Edwards curves and twisted Edwards curves. This answers a question recently asked by R
Mehra N. Borazjany, Linbin Yu, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
In this paper we present a case study of applying combinatorial testing to test a combinatorial test generation tool called ACTS. The purpose of this study is two-fold. First, we want to gain experience and insights about how to apply combinatorial testing
Kiran Shakya, Tao Xie, Nuo Li, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
Combinatorial Testing (CT) is a systematic way of sampling input parameters of the software under test (SUT). A t-way combinatorial test set can exercise all behaviors of the SUT caused by interactions between t input parameters or less. Although
In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify the
Dustin Moody, Souradyuti Paul, Daniel C. Smith-Tone
The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably low, only
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. Most prominently, shape descriptors are used to describe the geometric and topological properties of objects and compared to determine two
At peak luminosity, Type Ia supernovae can be even brighter than their parent galaxies, and their light curves display a very uniform and regular behavior. This makes them excellent candidates for a role as standard candles in measuring the distances to
A TABLE ERRATA is submitted concerning a formula in terms of a sum of two Gauss hypergeometric functions for Ferrers function of the second kind. This error occurs on p. 167 of Magnus, Oberhettinger & Soni (1966) Formulas and Theorems for the Special
In this paper, we propose a quantification of the vulnerability of a communication network when links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between a network
In this paper we look at three families of elliptic curves with rational 3-torsion over a finite field. These families include Hessian curves, twisted Hessian curves, and a new family we call generalized DIK curves. We find the number of Fq-isogeny classes
We show how the Fourier transform of a shape in any number of dimensions can be simplified using Gauss' law and evaluated explicitly for polygons in two dimensions, polyhedra three dimensions, etc. We also show how this combination of Fourier and Gauss can