Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 51 - 75 of 204

Review of the Advanced Encryption Standard

July 23, 2021
Author(s)
Nicky Mouha, Morris Dworkin
… Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES). … Review of the Advanced Encryption Standard …

Key Recovery Attack for All Parameters of HFE-

June 4, 2017
Author(s)
Jeremy Vates, Daniel Smith-Tone
… have received attention as candidates for multivariate encryption. Among these candidates is the twenty year old HFE … originally envisioned as a possible candidate for both encryption and digital signatures, depending on the number of … than one. Thus it seems reasonable to use HFE – for encryption with two equations removed. This strategy may not …

Guidance on the TDEA Block Ciphers

November 27, 2017
Author(s)
Elaine B. Barker, Larry Feldman, Gregory A. Witte
… NIST SP 800-67, Rev. 2, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. This bulletin … block cipher, computer security, cryptography, data encryption algorithm, security, triple data encryption algorithm …

Protecting Additive Manufacturing Information when Encryption is Insufficient

December 1, 2022
Author(s)
Joshua Lubell
… a material extrusion-based 3D printing process can bypass encryption-based defenses to obtain proprietary design … appropriate alternatives when technical controls such as encryption are not an option. … Protecting Additive Manufacturing Information when Encryption is Insufficient …

Encryption is Futile: Reconstructing 3D-Printed Models using the Power Side-Channel

October 6, 2021
Author(s)
Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy
… data to external malicious actors. Even with end-to-end encryption between the design owner and 3D-printer, … enables accurate design reconstruction in the face of full encryption measures without any prior knowledge of the … Encryption is Futile: Reconstructing 3D-Printed Models using …

High Speed Quantum Key Distribution System Supports One-Time Pad Encryption of Real-Time Video

April 21, 2006
Author(s)
Alan Mink, Xiao Tang, Lijun Ma, Anastase Nakassis, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
… model and hardware support. Practical one-time pad encryption requires high key generation rates since one bit … Quantum Key Distribution System Supports One-Time Pad Encryption of Real-Time Video …

High Speed Quantum Key Distribution System Supports One-Time Pad Encryption of Real-Time Video

April 1, 2006
Author(s)
Alan Mink, Xiao Tang, Lijun Ma, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark, Carl J. Williams
… model and hardware support. Practical one-time pad encryption requires high key generation rates since one bit … Quantum Key Distribution System Supports One-Time Pad Encryption of Real-Time Video …

DES Modes of Operation [includes Change Notice of May 31, 1996]

December 2, 1980
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
… [Withdrawn May 19, 2005] The Federal Data Encryption Standard (DES) (FIPS 46) specifies a cryptographic … computer security, cryptography, data security, DES, encryption, Federal Information Processing Standards, modes …

Trustworthy Email

September 6, 2016
Author(s)
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
… Recommendations for email content security include the encryption and authentication of message content using S/MIME … Cybersecurity, email, encryption, DNS …

Secure Messaging in BACnet

November 1, 2005
Author(s)
David G. Holmberg
… for integrity protection, and higher security with encryption for confidentiality. An introduction to the BACnet … authorization, BACnet, building automation system, encryption, hash, key, network …

NIST Special Publication 800-227, Recommendations for Key-Encapsulation Mechanisms

September 18, 2025
Author(s)
Gorjan Alagic, Elaine Barker, Lidong Chen, Dustin Moody, Angela Robinson, Hamilton Silberg, Noah Waller
… perform essential tasks in secure communications, such as encryption and authentication. This document describes the … cryptography, encryption, key-encapsulation mechanism, key establishment, …

Report on the NIST Java TM AES Candidate Algorithm Analysis

November 25, 1999
Author(s)
James F. Dray Jr.
… NIST solicited candidate algorithms for the Advanced Encryption Standard in a Federal Register Announcement dated … advanced encryption standard, AES candidate algorithm analysis, JAVA …

Security in ISDN

September 1, 1991
Author(s)
William E. Burr
… voice use of the public network. Terminal-to-terminal link encryption provides a powerful ISDN security mechanism, … authentication, encryption, ISDN security, link encryption, network security, OSI security, public network …

NIST First Call for Multi-Party Threshold Schemes

January 20, 2026
Author(s)
Luis Teixeira D'Aguiar Norton Brandao, Rene Peralta
… an underlying cryptographic primitive (e.g., signature, encryption, decryption, key generation) is computed in a … The scope of Class S also includes fully-homomorphic encryption, zero-knowledge proofs, and auxiliary gadgets. … Crypto-systems, distributed systems, fully-homomorphic encryption (FHE), post-quantum cryptography (PQC), secure …

Modes of Operation Validation System (MOVS): Requirements and Procedures

February 1, 1998
Author(s)
Sharon S. Keller, Miles E. Smid
… of the DES algorithm in FIPS PUB 46-2 , The Data Encryption Standard (DES) and the Skipjack algorithm in FIPS PUB 185, Escrowed Encryption Standard (ESS). The MOVS is designed to perform … automated testing, computer security, cryptography, data encryption standards, NVLAP, secret key cryptography, …

A Unified Framework for Mobile Device Security

June 15, 2004
Author(s)
Wayne Jansen, Vlad Korolev, Serban I. Gavrila, T Heute, Clement Seveillac
… add-on mechanisms as improved user authentication, content encryption, organizational policy controls, virus protection, … file encryption, mobile security, policy enforcement, security …

Report on Pairing-based Cryptography

February 3, 2015
Author(s)
Dustin Moody, Rene C. Peralta, Ray A. Perlner, Andrew R. Regenscheid, Allen L. Roginsky, Lidong Chen
… includes a brief introduction on existing identity-based encryption (IBE) schemes and other cryptographic schemes … pairings, cryptography, elliptic curves, identity-based encryption, IBE …

Key Recovery Attack for ZHFE

June 4, 2017
Author(s)
Daniel Cabarcas, Daniel Smith-Tone, Javier A. Verbel
… an interesting new technique for multivariate post-quantum encryption. The scheme is a generalization of HFE in which a … Multivariate public key cryptography, encryption schemes, ZHFE …

Design Alternatives for Computer Network Security

January 1, 1978
Author(s)
Gerald D. Cole, Dennis K. Branstad
… would incorporate the National Bureau of Standards Data Encryption Standard algorithm. The investigation showed that … communication, computer networks, cryptography, encryption, security …
Displaying 51 - 75 of 204
Was this page helpful?