Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 76 - 100 of 204

Domain Name System-Based Electronic Mail Security

January 15, 2018
Author(s)
Scott W. Rose, Karen M. Waltermire, Santos Jha, Chinedum Irrechukwu, William C. Barker
… authentication of mail servers, digital signature and encryption of email, and binding cryptographic key … Domain Name System, DNSSEC, DANE, electronic mail, email, encryption, digital signature, X.509, transport layer …

Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process

July 22, 2020
Author(s)
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang, John M. Kelsey, Yi-Kai Liu, Carl A. Miller, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Jacob Alperin-Sheriff
… one or more additional digital signatures, public-key encryption, and key-establishment algorithms to augment FIPS … of the competition. The third-round finalist public-key encryption and key-establishment algorithms are Classic … mechanism (KEM), post-quantum cryptography, public-key encryption, quantum resistant, quantum safe …

Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process

January 31, 2019
Author(s)
Gorjan Alagic, Jacob M. Alperin-Sheriff, Daniel Apon, David Cooper, Quynh H. Dang, Carl Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Yi-Kai Liu
… one or more additional digital signature, public-key encryption, and key-establishment algorithms to augment FIPS … the competition. The 17 Second-Round Candidate public-key encryption and key-establishment algorithms are BIKE, Classic … digital signatures, post-quantum cryptography, public-key encryption, key- establishment mechanism (KEM), quantum …

Cryptographic Standards and Guidance: A Status Report

September 1, 2002
Author(s)
Elaine B. Barker
… distinct keys should be used when Triple DES is used for encryption (Triple DES was adopted in FIPS 46-3 and specified … cryptography, digital signatures, encryption, entity authentication, hash functions, key …

Module-Lattice-Based Key-Encapsulation Mechanism Standard

August 13, 2024
Author(s)
National Institute of Standards and Technology (NIST), Gorjan Alagic, Quynh Dang, Dustin Moody, Angela Robinson, Hamilton Silberg, Daniel Smith-Tone
… to perform basic tasks in secure communications, such as encryption and authentication. This standard specifies a … computer security, cryptography, encryption, Federal Information Processing Standards, …

The Network Security Center: a System Level Approach to Computer Network Security

January 1, 1978
Author(s)
Frank Heinrich
… Network Cryptographic Devices that use the NBS Data Encryption Standard algorithm and are capable of being … computer network security, cryptography, end-to-end encryption, inter-computer network, internetting, NBS Data Encryption Standard, Network Cryptographic Devices, Network …

Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

September 29, 2022
Author(s)
Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone
… will specify additional digital signature, public-key encryption, and key-establishment algorithms to augment … be evaluated in a fourth round of analysis. The public-key encryption and key-establishment algorithm that will be … ·key-establishment ·post-quantum cryptography ·public-key encryption ·quantum resistant ·quantum safe …

Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

July 5, 2022
Author(s)
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
… will specify additional digital signature, public-key encryption, and key-establishment algorithms to augment … be evaluated in a fourth round of analysis. The public-key encryption and key-establishment algorithm that will be … ·key-establishment ·post-quantum cryptography ·public-key encryption ·quantum resistant ·quantum safe …

Vulnerabilities of "McEliece in the World of Escher"

March 3, 2016
Author(s)
Dustin Moody, Ray A. Perlner
… Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, … parameters which was able to recover private keys for both encryption and signatures in approximately 2 hours on a … to grow by (at least) two orders of magnitude for encryption, and may not be achievable at all for signatures. …

Security Analysis and Key Modification for ZHFE

February 4, 2016
Author(s)
Ray A. Perlner, Daniel C. Smith-Tone
… the few promising candidates for a multivariate public-key encryption algorithm. In this article we extend and expound … We further suggest a modi cation, ZHFE - , a multivariate encryption scheme which retains the security and performance …

Requirements for Cryptographic Accordions

April 11, 2025
Author(s)
Yu Long Chen, Michael Davidson, Morris Dworkin, John Kelsey, Yu Sasaki, Meltem Sonmez Turan, Alyssa Thompson, Nicky Mouha, Donghoon Chang
… accordion, authenticated encryption, disk encryption, encode-then-encipher, key wrapping, length-preserving encryption

Mission Critical Voice Quality of Experience Access Time Measurement Method Addendum

December 1, 2020
Author(s)
Chelsea Greene, Jesse Frey, Zainab O. Soetan, Jaden Pieper, Silas Thompson
… of testing Project 25 (P25) technologies with and without encryption turned on, as well as some initial Long Term … Band Correlation Modified Rhyme Test (ABC-MRT), A-weight, Encryption, Key performance indicator (KPI), Land mobile …

Psst, Can you Keep a Secret?

January 2, 2018
Author(s)
Apostol T. Vassilev, Nicky W. Mouha, Luis T. A. N. Brandao
The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables

Techniques for System and Data Recovery

April 1, 2002
Author(s)
William E. Burr, Joan Hash
… authentication, backup, contingency, data availability, encryption, encryption keys, key recovery …

Making Email Trustworthy

October 24, 2016
Author(s)
Scott W. Rose, Larry Feldman, Gregory A. Witte
… cybersecurity, email, encryption, DNS …
Displaying 76 - 100 of 204
Was this page helpful?