An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Dylan Sanderson, Therese McAllister, Jennifer Helgeson, Rithika Dulam
Chronic hazards associated with a changing climate may necessitate difficult adaptation decisions in many coastal communities. Computational tools that account
Zack Buck, Newell Moser, Nicholas Derimow, May Ling Martin, Damian Lauria, Enrico Lucon, Douglas Stalheim, Peter Bradley, Matthew Connolly
Hydrogen has long been considered a viable carbon-free option for ever-increasing societal desires to transform our energy infrastructure towards more renewable
Research insights critical to improving people's cybersecurity experiences and outcomes may not be integrated into practice, demonstrating the often-observed
Symmetric cryptography primitives are constructed by iterative applications of linear and nonlinear layers. Constructing efficient circuits for these layers
Smart home technology may expose adopters to increased risk to network security, information privacy, and physical safety. However, users of this technology may
This talk will cover findings from over 4 years of NIST phishing training data, highlighting user context as the key to phishing susceptibility. We will discuss
Jim Filliben has inspired many scientists in a variety of domains across the National Institute of Standard and Technology (NIST) with his statistical data
This presentation will describe the development of consumer-focused IoT cybersecurity label criteria in response to a U.S. Presidential Executive Order. The
This talk will cover findings from over 4 years of NIST phishing training data, highlighting user context as the key to phishing susceptibility. We will discuss
The National Institute of Standards and Technology (NIST) Research Library occupies the unique position of serving NIST both as publisher of the NIST Technical
Emily Caldwell, Laura Sinclair, Jean-Daniel Deschenes, Nathan R. Newbury
Dual comb ranging is a well-established method of laser-based ranging that exploits frequency combs to provide absolute, high-precision measurements. It suffers
Whether you're implementing security policy or developing products, considering the human element is critical. Yet security professionals often fall victim to
This presentation is for the May 17, 2022 Federal Information Security Educators (FISSEA) Spring Forum hosted by NIST. This presentation will present our
Ascon is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. In 2019, Ascon was
EVAP-COND is a software package that contains simulation models for a finned-tube evaporator and condenser. The modeling scheme allows for specifying complex