Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 2231

A Review of the Literature on Voter Verification and Ballot Review

July 8, 2024
Author(s)
Whitney Quesenbery, Suzanne Chapman, Christopher Patten, Roberto Spreggiaro, Shanee Dawkins
One of the major issues for voting systems today is whether they provide voters with a meaningful opportunity to verify their ballot before casting it. This opportunity is important in helping them vote their intent by catching errors or omissions made

How Voters Review and Verify Ballots

July 8, 2024
Author(s)
Suzanne Chapman, Lynn Baumeister, Whitney Quesenbery, Shanee Dawkins
Qualitative research to gain deeper insights about how voters mark, review, verify, and cast their ballots. Conducted as part of the work to update the human factors—accessibility, privacy, and usability—requirements in federal voting system standards and

An Adaptable AI Assistant for Network Management

July 3, 2024
Author(s)
Amar Abane, Abdella Battou, Mheni Merzouki
This paper presents a network management AI assistant built with Large Language Models. It adapts at runtime to the network state and specific platform, leveraging techniques like prompt engineering, document retrieval, and Knowledge Graph integration. The

Enhancing Network Data Plane Analysis with Native Graph Database

July 3, 2024
Author(s)
Amar Abane, Abdella Battou, Mheni Merzouki
As modern networks grow in complexity, ensuring their reliability and security becomes increasingly vital. Data plane analysis is a key process for verifying network behavior, but traditional data plane analysis tools face challenges in extensibility

Global Community Technology Challenge (GCTC) Strategic Plan 2024-2026

June 28, 2024
Author(s)
Michael Dunaway, Thomas Roth, Edward Griffor, David A. Wollman
This document provides a strategy and a project plan for the Global Community Technology Challenge, a federal smart cities program led by the Smart Connected Systems Division at the National Institute of Standards and Technology, an agency of the U.S

Leveraging Combinatorial Coverage in the Machine Learning Product Lifecycle

June 27, 2024
Author(s)
Jaganmohan Chandrasekaran, erin lanus, tyler cody, laura freeman, Raghu N. Kacker, M S Raunak, D. Richard Kuhn
The data-intensive nature of machine learning (ML)-enabled systems introduces unique challenges in test and evaluation. We present an overview of combinatorial coverage, exploring its applications across the ML-enabled system lifecycle and its potential to

Parmesan: mathematical concept extraction for education

May 20, 2024
Author(s)
Jacob Collard, Valeria de Paiva, Eswaran Subrahmanian
Mathematics is a highly specialized domain with its own unique set of challenges. Despite this, there has been relatively little research on natural language processing for mathematical texts, and there are few mathematical language resources aimed at NLP

An Infrastructure for Secure Data Sharing: A Clinical Data Implementation

May 15, 2024
Author(s)
Joanna DeFranco, Joshua Roberts, David Ferraiolo, Daniel Compton
Objective: To address database interoperability challenges to improve collaboration among disparate organizations. Materials and Methods: We developed a lightweight system to allow broad but well-controlled data sharing while preserving local data

Assessing Security Requirements for Controlled Unclassified Information

May 14, 2024
Author(s)
Ronald S. Ross, Victoria Yan Pillitteri
The protection of Controlled Unclassified Information (CUI) is of paramount importance to federal agencies and can directly impact the ability of the Federal Government to successfully conduct its essential missions and functions. This publication provides

Access Control on NoSQL Databases

May 7, 2024
Author(s)
Vincent C. Hu
NoSQL database systems and data stores often outperform traditional RDBMS in various aspects, such as data analysis efficiency, system performance, ease of deployment, flexibility/scalability of data management, and users' availability. However, with an

JARVIS-Leaderboard: A Large Scale Benchmark of Materials Design Methods

May 7, 2024
Author(s)
Kamal Choudhary, Daniel Wines, Kevin Garrity, aldo romero, Jaron Krogel, Kayahan Saritas, Panchapakesan Ganesh, Paul Kent, Pascal Friederich, Vishu Gupta, Ankit Agrawal, Pratyush Tiwary, ichiro takeuchi, Robert Wexler, Arun Kumar Mannodi-Kanakkithodi, Avanish Mishra, Kangming Li, Adam Biacchi, Francesca Tavazza, Ben Blaiszik, Jason Hattrick-Simpers, Maureen E. Williams
Reproducibility and validation are major hurdles for scientific development across many fields. Materials science in particular encompasses a variety of experimental and theoretical approaches that require careful benchmarking. Leaderboard efforts have

Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model

April 29, 2024
Author(s)
Kelsey Jackson, Carl A. Miller, Daochen Wang
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversaries. The primary digital signature scheme that

Practical Attack on All Parameters of the DME Signature Scheme

April 28, 2024
Author(s)
Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all the candidates. The public key is constructed from the alternation of very structured linear and non-linear

Incorporating Syncable Authenticators Into NIST SP 800-63B

April 22, 2024
Author(s)
Ryan Galluzzo, Andrew Regenscheid, David Temoshok, Connie LaSalle
This supplement to NIST Special Publication 800-63B, Authentication and Lifecycle Management, provides agencies with additional guidance on the use of authenticators that may be synced between devices.

On Combinatorial Security Testing for the Tor Anonymity Network Client

April 7, 2024
Author(s)
Dimitris Simos, Bernhard Garn, Dominik-Philip Schreiber, Manuel Leithner, D. Richard Kuhn, Raghu N. Kacker
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is important to evaluate not only its functionality, but also the security it provides to its users

Automated Network Programmability Using OpenConfig YANG Models and NETCONF Protocol

April 2, 2024
Author(s)
Abderrahim Amlou, Amar Abane, Mheni Merzouki, Lydia Ait Oucheggou, Zineb Maasaoui, Abdella Battou
This paper introduces a microservice-based architecture designed to enable automation of network programmability and management. Amid the complexity of today's networks and the diversity of equipment, achieving efficient and reliable network
Displaying 1 - 25 of 2231