Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 2001 - 2025 of 5421

Improving Security and Software Management through the use of SWID Tags

July 13, 2016
Author(s)
David A. Waltermire, Larry Feldman, Gregory A. Witte
This bulletin summarized the information presented in NISTIR 8060, "Guidelines for the Creation of Interoperable Software Identification (SWID) Tags". The publication provides an overview of the capabilities and usage of SWID tags as part of a

Recent Activities of the National Commission on Forensic Science

July 1, 2016
Author(s)
John Butler
In February 2013, the U.S. Department of Justice (DOJ) and the National Institute of Standards and Technology (NIST) announced a partnership that included formation of the National Commission on Forensic Science (NCFS) and what is now the Organization of

Protecting Wireless Local Area Networks

December 3, 2012
Author(s)
Shirley M. Radack, David R. Kuhn
This article summarizes the information that was presented in the February 2012 Information Technology Laboratory (ITL) bulletin, Guidelines for Securing Wireless Local Area Networks (WLANs). The bulletin, which was noted by WERB in February 2012, was

NIST Special Database 300: Uncompressed Plain and Rolled Images from Fingerprint Cards

June 14, 2018
Author(s)
Gregory P. Fiumara, Patricia A. Flanagan, John D. Grantham, Bruce Bandini, Kenneth Ko, John M. Libert
A new collection of legacy inked rolled and plain fingerprint card scans are being released to the public. The cards were scanned at three resolutions in the 8 bit grayscale colorspace. The data is available as lossless images for free.

Infiltration and Ventilation in a Very Tight Home

September 23, 2015
Author(s)
Lisa C. Ng, Andrew K. Persily, Steven J. Emmerich
… The Net Zero Energy Residential Test Facility (NZERTF) was … support the development and adoption of cost-effective net zero energy designs and technologies. Key design objectives …

Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process

July 20, 2021
Author(s)
Meltem Sonmez Turan, Kerry McKay, Donghoon Chang, Cagdas Calik, Lawrence E. Bassham, Jinkeon Kang, John M. Kelsey
The National Institute of Standards and Technology (NIST) is in the process of selecting one or more authenticated encryption and hashing schemes suitable for constrained environments through a public, competition-like process. In February 2019, 57

Optimizing the Location Deployment of Dynamic Mobile Base Stations

February 19, 2015
Author(s)
Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, David W. Griffith, Nada T. Golmie
There has been growing interest over the past few years in the US and around the world to build reliable, robust, and interoperable public safety broadband networks for emergency and disaster response. In this paper, we propose a low-cost, dynamic

Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

February 23, 2011
Author(s)
Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms currently specified in the Federal Information
Displaying 2001 - 2025 of 5421
Was this page helpful?