Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 2256

Parmesan: mathematical concept extraction for education

May 20, 2024
Author(s)
Jacob Collard, Valeria de Paiva, Eswaran Subrahmanian
Mathematics is a highly specialized domain with its own unique set of challenges. Despite this, there has been relatively little research on natural language processing for mathematical texts, and there are few mathematical language resources aimed at NLP

An Infrastructure for Secure Data Sharing: A Clinical Data Implementation

May 15, 2024
Author(s)
Joanna DeFranco, Joshua Roberts, David Ferraiolo, Daniel Compton
Objective: To address database interoperability challenges to improve collaboration among disparate organizations. Materials and Methods: We developed a lightweight system to allow broad but well-controlled data sharing while preserving local data

Assessing Security Requirements for Controlled Unclassified Information

May 14, 2024
Author(s)
Ronald S. Ross, Victoria Yan Pillitteri
The protection of Controlled Unclassified Information (CUI) is of paramount importance to federal agencies and can directly impact the ability of the Federal Government to successfully conduct its essential missions and functions. This publication provides

Ensuring Reliability Through Combinatorial Coverage Measures

May 14, 2024
Author(s)
M S Raunak, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
A key question in software assurance is, "How much testing is enough?" Coverage criteria such as statement or branch coverage were developed to help answer this question, but we also need to measure whether tests are sufficiently representative of inputs

Access Control on NoSQL Databases

May 7, 2024
Author(s)
Vincent C. Hu
NoSQL database systems and data stores often outperform traditional RDBMS in various aspects, such as data analysis efficiency, system performance, ease of deployment, flexibility/scalability of data management, and users' availability. However, with an

JARVIS-Leaderboard: A Large Scale Benchmark of Materials Design Methods

May 7, 2024
Author(s)
Kamal Choudhary, Daniel Wines, Kevin Garrity, aldo romero, Jaron Krogel, Kayahan Saritas, Panchapakesan Ganesh, Paul Kent, Pascal Friederich, Vishu Gupta, Ankit Agrawal, Pratyush Tiwary, ichiro takeuchi, Robert Wexler, Arun Kumar Mannodi-Kanakkithodi, Avanish Mishra, Kangming Li, Adam Biacchi, Francesca Tavazza, Ben Blaiszik, Jason Hattrick-Simpers, Maureen E. Williams
Reproducibility and validation are major hurdles for scientific development across many fields. Materials science in particular encompasses a variety of experimental and theoretical approaches that require careful benchmarking. Leaderboard efforts have

Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model

April 29, 2024
Author(s)
Kelsey Jackson, Carl A. Miller, Daochen Wang
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversaries. The primary digital signature scheme that

Practical Attack on All Parameters of the DME Signature Scheme

April 28, 2024
Author(s)
Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all the candidates. The public key is constructed from the alternation of very structured linear and non-linear

Incorporating Syncable Authenticators Into NIST SP 800-63B

April 22, 2024
Author(s)
Ryan Galluzzo, Andrew Regenscheid, David Temoshok, Connie LaSalle
This supplement to NIST Special Publication 800-63B, Authentication and Lifecycle Management, provides agencies with additional guidance on the use of authenticators that may be synced between devices.

On Combinatorial Security Testing for the Tor Anonymity Network Client

April 7, 2024
Author(s)
Dimitris Simos, Bernhard Garn, Dominik-Philip Schreiber, Manuel Leithner, D. Richard Kuhn, Raghu N. Kacker
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is important to evaluate not only its functionality, but also the security it provides to its users

Automated Network Programmability Using OpenConfig YANG Models and NETCONF Protocol

April 2, 2024
Author(s)
Abderrahim Amlou, Amar Abane, Mheni Merzouki, Lydia Ait Oucheggou, Zineb Maasaoui, Abdella Battou
This paper introduces a microservice-based architecture designed to enable automation of network programmability and management. Amid the complexity of today's networks and the diversity of equipment, achieving efficient and reliable network

Non-Fungible Token Security

March 1, 2024
Author(s)
Peter Mell, Dylan Yaga
Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for autographing digital assets (associating one's name with a digital

XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF

March 1, 2024
Author(s)
John M. Kelsey, Stefan Lucks
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e. a seed drawn from any ramdom source with sufficient entropy. The current paper formalizes a security notion for a DRBG, allowing the attacker to

Challenges of Assured Autonomy

February 28, 2024
Author(s)
D. Richard Kuhn
This article summarizes some recent novel approaches to the problem of verification, testing, and assurance of autonomous systems. These include proxy verification and combinatorial methods for input space coverage measurement, which also has applications

Application of the Hybrid Satellite Network Cybersecurity Framework Profile: An Example Implementation of NIST IR 8441

February 23, 2024
Author(s)
Frederick R. Byers, Dan Mamula, Karri Meldorf, Joseph Brule, Rory Jennings, John Wiltberger, Eugene Craft, John Dombrowski, O'Ryan Lattin, Abdul Noor, Matt Yetto, Aliaksander Mamonau, Oksana Slivina, Jay Sharma, Dr. Kangmin Zheng
The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The elements of an HSN may have
Displaying 26 - 50 of 2256