Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 457

Maximally Edge-Connected Realizations and Kundu's k-factor Theorem

August 3, 2023
Author(s)
James Shook
A simple graph $G$ with edge-connectivity $\lambda(G)$ and minimum degree $\delta(G)$ is maximally edge connected if $\lambda(G)=\delta(G)$. In 1964, given a non-increasing degree sequence $\pi=(d_1},\ldots,d_n})$, Jack Edmonds showed that there is a

Discovery and Recognition of Formula Conceptsusing Machine Learning

July 13, 2023
Author(s)
Howard Cohl, Bela Gipp, Moritz Schubotz, Philipp Scharpf
Citation-based Information Retrieval (IR) methods for scientific documents have proven effective for IR applications, such as Plagiarism Detection or Literature Recommender Systems in academic disciplines that use many references. In science, technology

Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process

June 16, 2023
Author(s)
Meltem Sonmez Turan, Kerry McKay, Donghoon Chang, Jinkeon Kang, Noah Waller, John M. Kelsey, Lawrence E. Bassham, Deukjo Hong
The National Institute of Standards and Technology (NIST) initiated a public standardization process to select one or more Authenticated Encryption with Associated Data (AEAD) and hashing schemes suitable for constrained environments. In February 2019, 57

Noise-resilient deep tomographic imaging

April 24, 2023
Author(s)
Zhen Guo, Zhiguang Liu, George Barbastathis, Qihang Zhang, Michael Glinsky, Bradley Alpert, Zachary H. Levine
X-ray tomography is a non-destructive imaging technique that reveals the interior of an object from its projections at different angles. Under limited-angle and low-photon sampling, a regularization prior is required to retrieve a high-fidelity

Separable Shape Tensors for Aerodynamic Design

January 31, 2023
Author(s)
Zachary J. Grey, Andrew Glaws, Olga Doronina
Airfoil shape design is a classical problem in engineering and manufacturing. In this work, we combine principled physics-based considerations for the shape design problem with modern computational techniques using a data-driven approach. Modern and

Extracting Mathematical Concepts from Text

October 12, 2022
Author(s)
Jacob Collard, Valeria de Paiva, Brendan Fong, Eswaran Subrahmanian
We investigate some different systems for extracting mathematical entities from texts in the mathematical field of category theory, as a first step for constructing a mathematical knowledge graph. We consider four different term extractors and compare

A characterization of the Centers of Chordal Graphs

September 30, 2022
Author(s)
James Shook, Bing Wei
A graph is $k$-chordal if it does not have an induced cycle with length greater than $k$. We call a graph chordal if it is $3$-chordal. Let $G$ be a graph. The distance between the vertices $x$ and $y$, denoted by $d_G}(x,y)$, is the length of a shortest

Provably efficient machine learning for quantum many-body problems

September 23, 2022
Author(s)
Hsin-Yuan Huang, Richard Kueng, Giacomo Torlai, Victor Albert, John Preskill
Classical machine learning (ML) provides a potentially powerful approach to solving challenging quantum many-body problems that arise in physics and chemistry, but the advantages of ML over more traditional classical methods have not been firmly

A Study of Error Floor Behavior in QC-MDPC Codes

August 17, 2022
Author(s)
Sarah Arpin, Tyler Billingsley, Daniel Hast, Jun Bo Lao, Ray Perlner, Angela Robinson
We present experimental findings on the decoding failure rate (DFR) of BIKE, a third-round candidate in the NIST Post-Quantum Standardization process, at the 20-bit security level. We select parameters according to BIKE design principles and conduct a

Recommendation for Key Derivation Using Pseudorandom Functions

August 17, 2022
Author(s)
Lily Chen
This Recommendation specifies techniques for the derivation of additional keying material from a secret key—either established through a key-establishment scheme or shared through some other manner—using pseudorandom functions: HMAC, CMAC, and KMAC.

Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

July 5, 2022
Author(s)
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signature, public
Displaying 26 - 50 of 457