Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Nicky Mouha (Assoc)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 7 of 7

Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations

February 14, 2020
Author(s)
Nicky W. Mouha, Christopher T. Celi
This paper describes a vulnerability in Apple's CoreCrypto library, which affects 11 out of the 12 implemented hash functions: every implemented hash function except MD2 (Message Digest 2), as well as several higher-level operations such as the Hash-based

Time to Standardize Threshold Schemes for Cryptographic Primitives

April 10, 2019
Author(s)
Luis Brandao, Michael S. Davidson, Nicky W. Mouha, Apostol T. Vassilev
This bulletin summarizes the information found in NISTIR 8214: Threshold Schemes for Cryptographic Primitives. NIST is interested in promoting the security of implementations of cryptographic primitives. This security depends not only on the theoretical

Threshold Schemes for Cryptographic Primitives

March 1, 2019
Author(s)
Luis T. A. N. Brandao, Nicky W. Mouha, Apostol T. Vassilev
The Computer Security Division at the National Institute of Standards and Technology is interested in promoting the security of implementations of cryptographic primitives. This security depends not only on the theoretical properties of the primitives but

Finding Bugs in Cryptographic Hash Function Implementations

July 6, 2018
Author(s)
Nicky W. Mouha, Mohammad Raunak, David R. Kuhn, Raghu N. Kacker
Cryptographic hash function implementations can be particularly difficult to test, and bugs can remain unnoticed for a very long time. We revisit the NIST SHA-3 hash function competition, and apply a new testing strategy to all available reference

Psst, Can you Keep a Secret?

January 2, 2018
Author(s)
Apostol T. Vassilev, Nicky W. Mouha, Luis T. A. N. Brandao
The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables

Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

November 17, 2017
Author(s)
Elaine B. Barker, Nicky W. Mouha
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). TDEA is intended to be used with a Special Publication (SP) 800-38-series-compliant mode of