Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 419

Discover STEM Education Resources

March 6, 2024
Author(s)
Cara O'Malley, Elizabeth Benham
The National Institute of Standards & Technology (NIST) invites educators to discover STEM resources on the NIST Educational STEM Resource (NEST-R) registry! Published by NIST scientists, engineers, & staff, NEST-R content is free & publicly available. It

Recommendation for Key Derivation Using Pseudorandom Functions

February 2, 2024
Author(s)
Lily Chen
This Recommendation specifies techniques for the derivation of additional keying material from a secret key—either established through a key-establishment scheme or shared through some other manner—using pseudorandom functions: HMAC, CMAC, and KMAC.

Emission Ghost Imaging: reconstruction with data augmentation

February 1, 2024
Author(s)
Kevin J. Coakley, Heather H. Chen-Mayer, Bruce D. Ravel, Daniel Josell, Nikolai Klimov, Sarah Robinson, Daniel S. Hussey
Ghost Imaging enables 2D reconstruction of an object even though particles transmitted or emitted by the object of interest are detected with a single pixel detector without spatial resolution. This is possible because the incident beam is spatially

Automated interpretation of firearm mark comparison results

December 13, 2023
Author(s)
Martin Baiker-Sorensen, Ivo Alberink, Laura Granell, Leen van der Ham, Erwin J.A.T. Mattijssen, Erich Smith, Johannes A. Soons, Peter Vergeer, Xiaoyu Alan Zheng
In this article an automated approach for interpretation of firearm mark comparison results is presented. First, similarity scores are derived for marks typically encountered on primers of fired cartridge cases: aperture shear striations as well as

Monitoring Spectrometer Drift with Unsupervised Machine Learning

November 20, 2023
Author(s)
Benjamin Harding, Ziling Hu, Ashley Hiett, Frank Delaglio, Katherine Henzler- Wildman, Chad Rienstra
Solid-state NMR spectroscopy (SSNMR) is a powerful technique to probe structural and dynamic properties of molecules at an atomic level. Modern SSNMR methods employ multidimensional pulse sequences requiring data collection over a period of days to weeks

Partial Elastic Shape Registration of 3D Surfaces using Dynamic Programming

November 3, 2023
Author(s)
Javier Bernal, James F. Lawrence
The computation of the elastic shape registration of two simple surfaces in 3−dimensional space and therefore of the elastic shape distance between them has been investigated by Kurtek, Jermyn, et al. who have proposed algorithms to carry out this

Maximally Edge-Connected Realizations and Kundu's k-factor Theorem

August 3, 2023
Author(s)
James Shook
A simple graph $G$ with edge-connectivity $\lambda(G)$ and minimum degree $\delta(G)$ is maximally edge connected if $\lambda(G)=\delta(G)$. In 1964, given a non-increasing degree sequence $\pi=(d_1},\ldots,d_n})$, Jack Edmonds showed that there is a

Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process

June 16, 2023
Author(s)
Meltem Sonmez Turan, Kerry McKay, Donghoon Chang, Jinkeon Kang, Noah Waller, John M. Kelsey, Lawrence E. Bassham, Deukjo Hong
The National Institute of Standards and Technology (NIST) initiated a public standardization process to select one or more Authenticated Encryption with Associated Data (AEAD) and hashing schemes suitable for constrained environments. In February 2019, 57

Noise-resilient deep tomographic imaging

April 24, 2023
Author(s)
Zhen Guo, Zhiguang Liu, George Barbastathis, Qihang Zhang, Michael Glinsky, Bradley Alpert, Zachary H. Levine
X-ray tomography is a non-destructive imaging technique that reveals the interior of an object from its projections at different angles. Under limited-angle and low-photon sampling, a regularization prior is required to retrieve a high-fidelity

Separable Shape Tensors for Aerodynamic Design

January 31, 2023
Author(s)
Zachary J. Grey, Andrew Glaws, Olga Doronina
Airfoil shape design is a classical problem in engineering and manufacturing. In this work, we combine principled physics-based considerations for the shape design problem with modern computational techniques using a data-driven approach. Modern and

Extracting Mathematical Concepts from Text

October 12, 2022
Author(s)
Jacob Collard, Valeria de Paiva, Brendan Fong, Eswaran Subrahmanian
We investigate some different systems for extracting mathematical entities from texts in the mathematical field of category theory, as a first step for constructing a mathematical knowledge graph. We consider four different term extractors and compare

A characterization of the Centers of Chordal Graphs

September 30, 2022
Author(s)
James Shook, Bing Wei
A graph is $k$-chordal if it does not have an induced cycle with length greater than $k$. We call a graph chordal if it is $3$-chordal. Let $G$ be a graph. The distance between the vertices $x$ and $y$, denoted by $d_G}(x,y)$, is the length of a shortest

A Study of Error Floor Behavior in QC-MDPC Codes

August 17, 2022
Author(s)
Sarah Arpin, Tyler Billingsley, Daniel Hast, Jun Bo Lao, Ray Perlner, Angela Robinson
We present experimental findings on the decoding failure rate (DFR) of BIKE, a third-round candidate in the NIST Post-Quantum Standardization process, at the 20-bit security level. We select parameters according to BIKE design principles and conduct a

Recommendation for Key Derivation Using Pseudorandom Functions

August 17, 2022
Author(s)
Lily Chen
This Recommendation specifies techniques for the derivation of additional keying material from a secret key—either established through a key-establishment scheme or shared through some other manner—using pseudorandom functions: HMAC, CMAC, and KMAC.

Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

July 5, 2022
Author(s)
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signature, public
Displaying 1 - 25 of 419