Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 74116

End-effector Pose Extrapolation using Wireless Channel State Information

April 21, 2026
Author(s)
Karl Montgomery, Nathan Wei, Jing Geng, Mohamed Hany, Richard Candell
Wireless communications for real-time control is an emerging field. There are many advantages gained by replacing a wired link with wireless; however, wireless brings unique challenges. Applications may need to be designed with wireless communications in

5G Network Security Design Principles: Applying 5G Cybersecurity and Privacy Capabilities

March 19, 2026
Author(s)
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Karen Kent, Parisa Grayeli, Sanjeev Sharma
This white paper describes the network infrastructure design principles that commercial and private 5G network operators are encouraged to use to improve cybersecurity and privacy. Such a network infrastructure isolates types of 5G network traffic from

Applying 5G Cybersecurity and Privacy Capabilities: Introduction to the White Paper Series

March 19, 2026
Author(s)
Jeffrey Cichonski, Michael Bartock, Murugiah Souppaya, Karen Kent, Parisa Grayeli, Sanjeev Sharma, Thomas McCarthy, Muthukkumaran Ramalingam, Presanna Raman, Stefano Righi, Jitendra Patel, Bogdan Ungureanu, Tao Wan, Matt Hyatt, Kori Rongey, Dan Carroll, Steve Orrin, Corey Piggott, Simon Hwang, Gary Atkinson, Rajasekhar Bodanki, Robert Cranston, Jorge Escobar, Don McBride, Aarin Buskirk, Bryan Wenger, Todd Gibson
This document introduces the white paper series titled Applying 5G Cybersecurity and Privacy Capabilities. This series is being published by the National Cybersecurity Center of Excellence (NCCoE) 5G Cybersecurity project. Each paper in the series will

No SUPI-Based Paging Applying 5G Cybersecurity and Privacy Capabilities

March 19, 2026
Author(s)
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Karen Kent, Parisa Greyeli, Sanjeev Sharma
This white paper provides an overview of "no Subscription Permanent Identifier (SUPI) based paging," a 5G capability for protecting users from being identified and located by an attacker. Unlike previous generations of cellular systems, new requirements in

Protecting Subscriber Identifiers with Subscription Concealed Identifier (SUCI) Applying 5G Cybersecurity and Privacy Capabilities

March 19, 2026
Author(s)
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Karen Kent, Parisa Grayeli, Sanjeev Sharma, Charles Teague
This white paper describes enabling Subscription Concealed Identifier (SUCI) protection, an optional 5G capability which provides important security and privacy protections for subscriber identifiers. 5G network operators are encouraged to enable SUCI on

Reallocation of Temporary Identities: Applying 5G Cybersecurity and Privacy Capabilities

March 19, 2026
Author(s)
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Karen Kent, Parisa Grayeli, Sanjeev Sharma
This white paper is part of a series called Applying 5G Cybersecurity and Privacy Capabilities, which covers 5G cybersecurity- and privacy-supporting capabilities that were implemented as part of the 5G Cybersecurity project at the National Cybersecurity

Secure Domain Name System (DNS) Deployment Guide

March 19, 2026
Author(s)
Scott Rose, Cricket Liu, Ross Gibson
This document provides Domain Name System (DNS) deployment guidelines to secure the DNS protocol and infrastructure, mitigate misuse or misconfiguration, and provide an additional layer of network security as part of a zero trust and/or defense-in-depth

Using Hardware- Enabled Security to Ensure 5G System Platform Integrity Applying 5G Cybersecurity and Privacy Capabilities

March 19, 2026
Author(s)
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Karen Kent, Parisa Grayeli, Sanjeev Sharma
This white paper provides an overview of employing hardware-enabled [1] security capabilities to provision, measure, attest to, and enforce the integrity of the compute platform to foster trust in a 5G system's server infrastructure. It discusses security

Accurate Volume Determination for Low Gas Flow Standards

March 17, 2026
Author(s)
Jodie Pope, Christopher Crowley, Max Low, John Wright, Aaron Johnson
The National Institute of Standards and Technology (NIST) has developed the Semiconductor Low Flow Standard (SLowFlowS), a new rate-of-rise (RoR) gas flow standard capable of measuring flows as low as 0.01 standard cm³/min. SLowFlowS incorporates two

Manufacturing USA 2025 Annual Report

March 17, 2026
Author(s)
Christina Jones, Mai Tran, Amelia Stephens
The Manufacturing USA 2025 Annual Report (covering activities from October 1, 2022, to September 30, 2023) highlights the impact of the national network of 17 public-private manufacturing innovation institutes. Coordinated by the Advanced Manufacturing

Manufacturing USA Program Strategic Plan

March 17, 2026
Author(s)
Robert Rudnitsky, Said Jahanmir, Zahraha Brunner, Kelley Rogers, Michael Molnar, Mai Tran
The Manufacturing USA Program Strategic Plan outlines the program's vision, mission, goals, and objectives for the next four years and describes how the Program will carry them out, including its technology investment strategy, its role in catalyzing

NIST Special Database 303

March 17, 2026
Author(s)
Gregory Fiumara, Kenneth Ko, Kasey Wertheim
Thousands of latent impression distal phalanx images and associated exemplar fingerprint images were collected for a study of forensic fingerprint examiner's ability to make suitability determinations. These images are being released for free to the

NIST CSWP 37A Automation of the NIST Cryptographic Module Validation Program

March 16, 2026
Author(s)
Christopher Celi, Alexander Calis, Murugiah Souppaya, William Barker, Karen Kent, Raoul Gabiam, Yi Mao, Barry Fussell, Andrew Karcher, Douglas Boldt
The Cryptographic Module Validation Program (CMVP) validates third-party assertions that cryptographic module implementations satisfy the requirements of Federal Information Processing Standards (FIPS) Publication 140-3, Security Requirements for

Guidelines for API Protection for Cloud-Native Systems - March 2026 Update

March 13, 2026
Author(s)
Ramaswamy Chandramouli, Zack Butcher
Modern enterprise IT systems rely on a family of application programming interfaces (APIs) for integration to support organizational business processes. Hence, a secure deployment of APIs is critical for overall enterprise security. This, in turn, requires

Blood proteomics: insights from public data

March 12, 2026
Author(s)
Asier Larrea, Chengxin Dai, Jochen Schwenk, Benjamin Neely, Cesar Martin, Yasset Perez-Riverol
The circulating blood proteome comprises soluble and cellular components that reflect physiological and pathological states across tissues. Advances in mass spectrometry and affinity-based proteomics have improved sensitivity and throughput, enabling the

Low-frequency cryocoolers are compressed inefficiently

March 10, 2026
Author(s)
Ryan Snodgrass, Vincent Kotsubo, Jens Hoehne, Joel Ullom
Millikelvin refrigerators are enabling tools for many fields of modern science, including quantum information processing. They are typically precooled to 4 K by low-frequency pulse-tube refrigerators, which perform a thermodynamic cycle based on

Understanding the Risk of Lithium-Ion Battery Fires - multi-source data analysis

March 10, 2026
Author(s)
Stanley Gilbert, Hongqiang Fang, David Butry, Wai Cheong Tam, Michelle Donnelly, Juan Fung
Lithium ion battery (LIB) fires are a growing problem that extends across the supply chain, including mining, production, warehousing, shipping, and waste disposal, as well as the consumer side. But data on such fires is fragmented and mostly incomplete

Challenges to the monitoring of deployed AI systems: Center for AI Standards and Innovation

March 6, 2026
Author(s)
Anita Rao, Andrew Keller, Neha Kalra, Ryan Steed, Kweku Kwegyir-Aggrey, Kevin Klyman, Diane Staheli, Amanda Bergman
As artificial intelligence (AI) systems are increasingly integrated into commercial and government applications, there is a growing need to monitor these systems in real-world settings. Although pre-deployment evaluations are valuable for assessing AI

Efficiently gate-tunable ferromagnetism in ferromagnetic semiconductor-Dirac semimetal p-n heterojunctions

March 6, 2026
Author(s)
Emma Steinebronn, Saurav Islam, Abhinava Chatterjee, Bimal Neupane, Alexander Grutter, Christopher Jensen, Julie Borchers, Timothy Charlton, Wilson J. Yanez-Parreno, Juan Chamorro, Tanya Berry, Supriya Ghosh, K. A. Nivedith, K. A. Mkhoyan, Tyrel McQueen, Yuanxi Wang, Chaoxing Liu, Nitin Samarth
We use molecular beam epitaxy to develop a gate tunable p-n heterojunction that interfaces a canonical Dirac semimetal, Cd3As2, and a ferromagnetic semiconductor, In1−xMnxAs, with perpendicular magnetic anisotropy. Measurements of the anomalous Hall effect

Maturation of computational materials approaches in qualification and certification for metal additive manufacturing (as an example of process-intensive materials) in aviation

March 4, 2026
Author(s)
Edward Glaessgen, Michael Gorelik, Lyle Levine, Corbett Battaile, Michael Kane, Nam Phan, Alexander Plotkowski, Edwin Schwalbach, Derrick Lamm, Narendran Raghavan, Nate Ashmore, Richard Barto, James Dobbs, Matthew Lynch, Markus Heinimann, Peter Kantzos, Alonso Peralta-Duran, Carl Popelar, Prabhjot Singh, Suresh Sundarraj, Paul Toivonen, Vasisht Venkatesh, Bret Vogel, Deborah Whitis, Harry Millwater, Anthony Rollett, Sankaran Mahadevan, Caglar Oskay, Todd Palmer, Gregory Wagner
Displaying 1 - 25 of 74116
Was this page helpful?