Skip to main content
U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Publications

NIST Authors in Bold

Displaying 1 - 25 of 1950

Securing Property Management Systems

Author(s)
William D. Newhouse
Hotels have become targets for malicious actors wishing to exfiltrate sensitive data, deliver malware, or profit from undetected fraud. Property management

National Institute of Standards and Technology Environmental Scan 2020

Author(s)
Heather M. Evans, Kristen Greene, William M. Healy, Elizabeth A. Hoffman, Catherine A. Rimmer, Anna V. Sberegaeva, Neil M. Zimmerman
The 2020 National Institute of Standards and Technology Environmental Scan provides an analysis of key external factors that could impact NIST and the

A system of quantities from software metrology

Author(s)
David Flater
International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 80000, the International System of Quantities, collects and

An Integrated Set of XML Tools – User Guide

Author(s)
Thomas R. Kramer, Zeid Kootbally, Craig Schlenoff
This user guide describes an integrated set of C++ software tools for manipulating XML (eXtensible Markup Language) schemas and XML instance files. The tools

Recommendation for Stateful Hash-Based Signature Schemes

Author(s)
David A. Cooper, Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, Carl A. Miller
This recommendation specifies two algorithms that can be used to generate a digital signature, both of which are stateful hash-based signature schemes: the

Combinatorial Methods for Explainable AI

Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei, Dimitris Simos
This paper introduces an approach to producing explanations or justifications of decisions made by artificial intelligence and machine learning (AI/ML) systems

Cryptanalysis of LEDAcrypt

Author(s)
Daniel C. Apon, Ray A. Perlner, Angela Y. Robinson, Paulo Santini
We report on the concrete cryptanalysis of LEDAcrypt, a 2nd Round candidate in NIST's Post- Quantum Cryptography standardization process and one of 17

2019 NIST/ITL Cybersecurity Program Annual Report

Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Larry Feldman, Gregory A. Witte
During Fiscal Year 2019 (FY 2019), from October 1, 2018 through September 30, 2019, the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy

Aggregating Atomic Clocks for Time-Stamping

Author(s)
Temur Saidkhodjaev, Jeffrey M. Voas, David R. Kuhn, Joanna DeFranco, Phil Laplante
A timestamp is a critical component in many applications, such as proof of transaction ordering or analyzing algorithm performance. This paper reports on a
Displaying 1 - 25 of 1950