Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 393

A characterization of the Centers of Chordal Graphs

September 30, 2022
James Shook, Bing Wei
A graph is $k$-chordal if it does not have an induced cycle with length greater than $k$. We call a graph chordal if it is $3$-chordal. Let $G$ be a graph. The distance between the vertices $x$ and $y$, denoted by $d_G}(x,y)$, is the length of a shortest

A Study of Error Floor Behavior in QC-MDPC Codes

August 17, 2022
Sarah Arpin, Tyler Billingsley, Daniel Hast, Jun Bo Lao, Ray Perlner, Angela Robinson
We present experimental findings on the decoding failure rate (DFR) of BIKE, a third-round candidate in the NIST Post-Quantum Standardization process, at the 20-bit security level. We select parameters according to BIKE design principles and conduct a

Recommendation for Key Derivation Using Pseudorandom Functions

August 17, 2022
Lily Chen
This Recommendation specifies techniques for the derivation of additional keying material from a secret key—either established through a key-establishment scheme or shared through some other manner—using pseudorandom functions: HMAC, CMAC, and KMAC.

Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

July 5, 2022
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signature, public

Pairs of Heron and right triangles with a common area and a common perimeter

May 23, 2022
Abhishek Juyal, Dustin Moody
A Heron triangle is one in which the side lengths and area are integers. An integral right triangle is an example of a Heron triangle. In this paper, we show that there are infinitely many pairs of integral right triangles and Heron triangles with a common

Grassmannian Shape Representations for Aerodynamic Applications

February 28, 2022
Olga Doronina, Zachary J. Grey, Andrew Glaws
Airfoil shape design is a classical problem in engineering and manufacturing. Our motivation is to combine principled physics-based considerations for the shape design problem with modern computational techniques informed by a data-driven approach

Theory of Curvature and Grooving Effects in DIGM - II: the Mathematics

October 12, 2021
O Penrose, John W. Cahn
We examine and solve the mathematical problems that arise when diffusion induced grain boundary motion is formulated as a free boundary problem, i.e. as a system of partial differential equations on a moving curved interface with surface grooving as a

On Computing Elastic Shape Distances between Curves in d-dimensional Space

June 21, 2021
Javier Bernal, James F. Lawrence, Gunay Dogan, Robert Hagwood
The computation of the elastic registration of two simple curves in higher dimensions and therefore of the elastic shape distance between them has been investigated by Srivastava et al. Assuming the first curve has one or more starting points, and the

Vectorizing Green's Identities

May 5, 2021
Alex Yuffa
Green's theorem and Green's identities are well-known and their uses span almost every branch of science and mathematics. In this paper, we derive a vector analogue of Green's three scalar identities and consider some of their uses. We also offer a number

Recovering the Key from the Internal State of Grain-128AEAD

April 3, 2021
Donghoon Chang, Meltem Sonmez Turan
Grain-128AEAD is one of the second-round candidates of the NIST lightweight cryptography standardization process. There is an existing body of third-party analysis on the earlier versions of the Grain family that provide insights on the security of Grain

Examining Recent HR Data for Gender Bias Among Federal Employees at NIST

March 26, 2021
Jasmine Evans, Amanda Koepke, Steven Lund, Mary Frances Theofanos
This report is part of a multi-phase mixed methods project that is designed to provide an in-depth look at the population of National Institute of Standards and Technology (NIST) federal employees to identify factors, attitudes, and processes that might


March 23, 2021
Dustin Moody, Abhishek Juyal
We study various properties of the family of elliptic curves x+ 1/x+y+ 1/y+t = 0, which is isomorphic to the Weierstrass curve E_t: Y^2=X(X^2+(t^2/4-2)X+1). This equation arises from the study of the Mahler measure of polynomials. We show that the rank of
Displaying 1 - 25 of 393