Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1301 - 1325 of 5421

Standard Reference Materials--the First Century

January 1, 2003
Author(s)
S D. Rasberry
Over the course of its first one hundred years, the National Institute of Standards and Technology (NIST) has made numerous contributions to advancing the science and practice of measurements. Contributions to fundamental constants and reference data, such

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

May 15, 2001
Author(s)
Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Elaine B. Barker, Stefan D. Leigh, M Levenson, M Vangel, D L. Banks, Nathanael A. Heckert, James F. Dray Jr., S C. Vo
[Superseded by SP 800-22 Revision 1a (April 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906762] This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may

Modes of Operation Validation System (MOVS): Requirements and Procedures

February 1, 1998
Author(s)
Sharon S. Keller, Miles E. Smid
The National Institute of Standards and Technology (NIST) Modes of Operation Validation System (MOVS) specifies the procedures involved in validating implementations of the DES algorithm in FIPS PUB 46-2 , The Data Encryption Standard (DES) and the

Technology Assessment: Methods for Measuring the Level of Computer Security

October 1, 1985
Author(s)
William Neugent, John Gilligan, Lance Hoffman, Zella G. Ruthberg
This technology assessment constitutes a summary and assessment of methods for measuring the level of computer security in computer applications, systems, and installations. The initial draft report for this document was produced in June 1981 for the

Glossary of Key Information Security Terms

June 5, 2013
Author(s)
Richard L. Kissel
… numerous requests to provide a summary glossary for our publications and other relevant sources, and to make the … This glossary includes most of the terms in the NIST publications. It also contains nearly all of the terms and … most commonly used in NIST information security publications and in CNSS information assurance publications. …

Spin excitation continuum from degenerate states in the mixed ferro-antiferromagnetic exchange system CeMgAl11O19

March 6, 2026
Author(s)
Bin Gao, Tong Chen, Chunxaio Liu, Mason Klemm, Shu Zhang, Zhen Ma, Xianghan Xu, CHOONGJAE WON, Gregory McCandless, Karthik Rao, Naoki Murai, Seiko Ohira-Kawamura, Stephen Moxim, Jason Ryan, Xiaozhou Huang, Xiaoping Wang, Manh Duc Le, Emilia Morosan, Julia Chan, Sang-Wook Cheong, Oleg Tchernyshyov, Leon Balents, Pengcheng Dai
… models can unveil the microscopic origins of these zero-field spin excitation continua. Here, we use neutron … states - assembly of umbrella states - develop in the zero temperature limit. Given that the observed zero-field spin excitation continuum matches the calculated …

Mobilities and Formation Kinetics of NH 4 + (NH 3 ) n Cluster Ions (n=0-3) in helium and helium/ammonia mixtures

January 1, 1997
Author(s)
M Krishnamurthy, J A. de Gouw, L N. Ding, V M. Bierbaum, S R. Leone
… in pure helium and also with previous measurements. The zero-field mobilities of the cluster ions in helium (22.1 … cross sections of the different cluster ions. The zero-field mobilities of NH 4 + (0.94 +or-} 0.15 cm 2 V -1 s … with the ion-dipole interactions taken into account. The zero-field mobilities of the larger clusters (0.45 +or-} 0.20 …

A Model-Based Analysis of First-Generation Service Discovery Systems

October 1, 2005
Author(s)
Christopher E. Dabrowski, Kevin L. Mills, Stephen Quirolgico
Future commercial software systems will be based on distributed service-oriented architectures in which applications are composed dynamically from remote components. A key part of service-oriented computing is the ability for clients to discover remote

Preparation of silver nanoparticle loaded cotton threads to facilitate measurement development for textile applications

January 26, 2015
Author(s)
Justin M. Gorham, Karen E. Murphy, Jingyu Liu, Dimitri Tselenchuk, Gheorghe NMN Stan, Thao M. Nguyen, Richard D. Holbrook, Michael R. Winchester, Robert F. Cook, Robert MacCuspie, Vincent A. Hackley
FOREWORD This NIST special publication (SP) is one in a series of NIST SPs that address research needs articulated in the National Nanotechnology Initiative (NNI) Environmental, Health, and Safety Research Strategy published in 2011 [1]. This Strategy

Glossary of Key Information Security Terms

February 17, 2011
Author(s)
Richard L. Kissel
… included are not all inclusive of terms found in these publications, but are a subset of those most frequently used. … of definitions most commonly used in NIST and CNSS publications. Each entry in the glossary points to one or more source NIST or CNSS publications, and in addition, other supplemental sources …

Functional Recovery Performance Targets Workshop Report

September 30, 2025
Author(s)
Lucy Arendt, Katherine Johnson, Siamak Sattar, Michael Valley, Divya Chandrasekhar, Laurie Johnson, Ryan Kersting
Held in October 2024, the Workshop on Functional Recovery Performance Targets was hosted by the National Institute of Standards and Technology (NIST) and managed by the Applied Technology Council (ATC-169). The workshop convened 48 interdisciplinary

Guidelines for the Use of PIV Credentials in Facility Access

June 29, 2018
Author(s)
Hildegard Ferraiolo, Ketan L. Mehta, Nabil Ghadiali, Jason Mohler, Vincent Johnson, Steven Brady
This recommendation provides a technical guideline to use Personal Identity Verification (PIV) Cards in facility access; enabling federal agencies to operate as government-wide interoperable enterprises. These guidelines cover the risk-based strategy to
Displaying 1301 - 1325 of 5421
Was this page helpful?