An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Grain-128AEAD is one of the second-round candidates of the NIST lightweight cryptography standardization process. There is an existing body of third-party analysis on the earlier versions of the Grain family that provide insights on the security of Grain
Jasmine Evans, Amanda Koepke, Steven Lund, Mary Frances Theofanos
This report is part of a multi-phase mixed methods project that is designed to provide an in-depth look at the population of National Institute of Standards and Technology (NIST) federal employees to identify factors, attitudes, and processes that might
We study various properties of the family of elliptic curves x+ 1/x+y+ 1/y+t = 0, which is isomorphic to the Weierstrass curve E_t: Y^2=X(X^2+(t^2/4-2)X+1). This equation arises from the study of the Mahler measure of polynomials. We show that the rank of
Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic
Heather Evans, Kristen K. Greene, William M. Healy, Elizabeth Hoffman, Kate Rimmer, Anna V. Sberegaeva, Neil M. Zimmerman
The 2020 National Institute of Standards and Technology Environmental Scan provides an analysis of key external factors that could impact NIST and the fulfillment of its mission in coming years. The analyses were conducted through four separate lenses
In 2010, the National Institute of Standards and Technology (NIST) launched the Digital Library of Mathematical Functions (DLMF), a free online resource containing definitions, recurrence relations, differential equations and other crucial information
Nicole K. Gingrich, Michael J. Hall, Isaac Patterson
In Science—the Endless Frontier, Vannevar Bush wrote that reaping the potential benefits of science conducted at federal laboratories requires the discoveries made in the labs be transferred to society. In federal laboratories, Offices of Research and
This document details methods to compare instrument performance. Comparison methods for instruments outputting binary (0-1) responses as well as for instruments outputting continuous numeric responses are shown, first for two instruments and then for
Ryan Evans, Arvind Balijepalli, Anthony J. Kearsley
To quantify interactions between drug molecules and target receptors, a novel nanoscale electronics instrument is under development. The instrument consists of two regions: a biological region, and an electronics region. The biological region consists of a
Nicole K. Gingrich, Isaac Patterson, Jimmy Nazario-Negron, Michael J. Hall
This study analyzes data from fiscal years 2015 through 2018 of eighteen interaction types in which NIST participates annually. To describe the volume of direct relationships NIST has with the U.S. economy, it calculates the average number of interactions
Paul Patrone, Qing Hai Li, Gregory A. Cooksey, Anthony J. Kearsley
A class of non-linear integro-differential equations characterizing microfluidic measurements is considered. Under reasonable conditions, these non-linear integro-differential equations admit solutions that are convex functions of an interesting flow-rate
In recent years, combinatorial testing methods have been successfully applied to test systems with a large number of input parameters. Generating combinatorial test sets for such complex systems is still a challenging task as it requires a lot of time and
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang, John M. Kelsey, Yi-Kai Liu, Carl A. Miller, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Jacob Alperin-Sheriff
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify one or more additional
Somayeh Mosleh, Yao Ma, Jake D. Rezac, Jason B. Coder
Dynamic spectrum access (DSA) to achieve spectrum sharing in unlicensed bands is a promising approach for meeting the growing demands of forthcoming and deployed wireless networks, such as long-term evolution license-assisted access (LTE-LAA) and IEEE 802
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). Part I (Overview) provides a high-level overview of the
Kevin J. Coakley, Jolene D. Splett, Dave K. Walker, Mustafa Aksoy, Paul E. Racette
We directly quantify the effect of infrequent calibration on the stability of microwave radiometer temperature measurements (where a power measurement for the unknown source is acquired at a fixed time but calibration data are acquired at variable earlier
Dustin Moody, Ray A. Perlner, Daniel C. Smith-Tone, Daniel C. Apon, Javier Verbel
In 2013, Tao et al. introduced the ABC Simple Matrix Scheme for Encryption, a multivariate public key encryption scheme. The scheme boasts great efficiency in encryption and decryption, though it suffers from very large public keys. It was quickly noted
Howard S. Cohl, Andre Greiner Petter, Moritz Schubotz, Corinna Breitinger, Fabian Muller, Akiko Aizawa, Bela Gipp
Mathematical notation, i.e., the writing system used to communicate concepts in mathematics, encodes valuable information for a variety of information search and retrieval systems. Yet, mathematical notations remain mostly unutilized by today's systems. In
Spencer J. Breiner, Blake S. Pollard, Eswaran Subrahmanian
This report presents the summary of a workshop held at NIST on March 15-16, 2018 on the topic of applied category theory (ACT). The meeting had two main goals: (i) mapping the current ACT landscape and (ii) developing a roadmap for transitioning the field
Tim LAI, Alicia Marino, Angela Robinson, Daqing Wan
The k-subset sum problem over finite fields is a classical NP-complete problem. Motivated by coding theory applications, a more complex problem is the higher m-th moment k-subset sum problem over finite fields. We show that there is a deterministic
Abstract. This paper constructs an unconditionally stable explicit difference scheme, marching backward in time, that can solve an interesting, but limited class of ill-posed, time-reversed 2D incompressible Navier-Stokes initial value problems. Stability
Jolene D. Splett, Felix M. Jimenez, Amanda A. Koepke
In ordinary least-squares regression, independent variables are assumed to be known without error. However, in many real-life situations this assumption is not valid. Both orthogonal distance regression and Bayesian errors-in-variables regression can be
Felix Kim, Adam L. Pintar, Shawn P. Moylan, Edward Garboczi
X-ray computed tomography (XCT) is a promising non-destructive evaluation technique for additively manufactured (AM) parts with complex shapes. Industrial XCT scanning is a relatively new development, and XCT has several acquisition parameters a user can
The constrained orthogonal Procrustes problem is the least-squares problem that calls for a rotation matrix that optimally aligns two corresponding sets of points in d-dimensional Euclidean space. This problem generalizes to the so-called Wahba's problem