Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Math Sorted by: date

Displaying records 1 to 10 of 105 records.
Resort by: Date / Title

1. Report on Post-Quantum Cryptography
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8105
Topic: Math
Published: 4/28/2016
Authors: Lidong Chen, Stephen P Jordan, Yi-Kai Liu, Dustin Moody, Rene C Peralta, Ray A Perlner, Daniel C Smith-Tone
Abstract: In recent years, there has been a substantial amount of research on quantum computers - machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale qua ...

2. Linear Time Vertex Partitioning on Massive Graphs
Topic: Math
Published: 3/7/2016
Authors: Peter M Mell, Richard Harang, Assane Gueye
Abstract: The problem of optimally removing a set of vertices from a graph to minimize the size of the largest resultant component is known to be NP-complete. Prior work has provided near optimal heuristics with a high time complexity that function on up to hu ...

3. A Fixed-Memory Moving, Expanding Window for Obtaining Scatter Corrections in X-Ray CT and Other Stochastic Averages
Topic: Math
Published: 5/30/2015
Authors: Zachary H Levine, Adam L Pintar
Abstract: A simple algorithm for averaging a stochastic sequence of 1D arrays in a moving, expanding window is provided. The samples are grouped in bins which increase exponentially in size so that a constant fraction of the samples is retained at any point i ...

4. A fast multipole method for the evaluation of elastostatic fields in a half-space with zero normal stress
Topic: Math
Published: 4/30/2015
Authors: Zydrunas Gimbutas, Leslie Greengard
Abstract: In this paper, we present a fast multipole method (FMM) for the half-space Green's function in a homogeneous elastic half-space subject to zero normal stress, for which an explicit solution was given by Mindlin (1936). The image structure of this Gre ...

5. Randomized methods for rank-deficient linear systems
Topic: Math
Published: 2/13/2015
Authors: Josef Sifuentes, Zydrunas Gimbutas, Leslie Greengard
Abstract: We present a simple, accurate method for solving consistent, rank-deficient linear systems, with or without additional rank-completing constraints. Such problems arise in a variety of applications, such as the computation of the eigenvectors of a ma ...

6. Report on Pairing-based Cryptography
Series: Journal of Research (NIST JRES)
Report Number: 120.002
Topic: Math
Published: 2/3/2015
Authors: Dustin Moody, Rene C Peralta, Ray A Perlner, Andrew Richard Regenscheid, Allen L Roginsky, Lidong Chen
Abstract: This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST‰s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standard ...

7. Adaptive Restructuring of Radial Basis Functions Using Integrate-and-Fire Neurons
Topic: Math
Published: 12/6/2014
Author: Jeremy A Marvel
Abstract: This paper proposes a neurobiology-based extension of integrate-and-fire models of Radial Basis Function Neural Networks (RBFNN) that adapts to novel stimuli by means of dynamic restructuring of the network's structural parameters. The new architect ...

8. Expansions for a fundamental solution of Laplace's equation on R^u3^ in 5-cyclidic harmonics
Topic: Math
Published: 10/14/2014
Authors: Howard S Cohl, Hans Volkmer
Abstract: We derive eigenfunction expansions for a fundamental solution of Laplace's equation in three-dimensional Euclidean space in 5-cyclidic coordinates. There are three such expansions in terms of internal and external 5-cyclidic harmonics of first, seco ...

9. An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Topic: Math
Published: 10/3/2014
Authors: Dustin Moody, Ray A Perlner, Daniel C Smith-Tone
Abstract: Historically, multivariate public key cryptography has been less than successful at offering encryption schemes which are both secure and efficient. At PQCRYPTO '13 in Limoges, Tao, Diene, Tang, and Ding introduced a promising new multivariate e ...

10. A Binomial Approximation Method for the Ising Model
Topic: Math
Published: 5/21/2014
Authors: Isabel M Beichl, Amanda A. Streib, Noah S. Streib, Francis Sullivan
Abstract: A large portion of the complexity inherent to the Ising model can be captures with a trivial amount of computation. in this work, we support this claim by defining an approximation to the partition function and other thermodynamic quantities of the ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series