An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NIST has taken advantage of recent technological advances to develop polymer microfluidic cell culture systems that provide a level of control over the cellular
In this study, the authors present a novel design framework aimed at developing ‘cooperative diversity’ in 802.11-based wireless sensor networks. The proposed
Linear dispersion codes (LDC) can support arbitrary configurations of transmit and receive antennas in multi-input multi-output (MIMO) systems. In this work, we
In this treatise, we focus our attention on the cooperative uplink transmissions of systems beyond the LTE-Advanced initiative. We commence a unified treatment
Robust core networks are critical infrastructure in an economy that relies on the exchange of digital information. New technologies, now in research and
This program aims to advance networking and measurement sciences and promote consensus standards and best practices for the evolution from 5G to 6G, focusing on
Commercial metering systems are ubiquitous in the commercial marketplace (to dispense liquified products, from gas and water to food products and agricultural
By conducting a narrowly targeted campaign of wireless activity at homes and hospitals during the COVID-19 pandemic, we seek a more accurate understanding of
The main focus of the project is to develop standard techniques for the measurement of critical current of high-temperature and low-temperature superconductors
The semiconductor industry is in need of new, high throughput in-line dimensional metrology methods to characterize next generation 3D nanostructures. The
The Cryptographic Algorithm Validation Program (CAVP) provides validation testing of FIPS-approved and NIST-recommended cryptographic algorithms and their
Users of the former "Crypto Toolkit" can now find that content under this project. It includes cryptographic primitives, algorithms and schemes are described in
A cryptographic hash algorithm (alternatively, hash "function") is designed to provide a random mapping from a string of binary data to a fixed-size “message
The Cryptographic Module Validation Program (CMVP) is a joint effort between the National Institute of Standards and Technology under the Department of Commerce
In 2013, news reports about leaked classified documents caused concern from the cryptographic community about the security of NIST cryptographic standards and
Users of the former "Crypto Toolkit" can now find that content under this project. It includes cryptographic primitives, algorithms and schemes are described in
Crystal Plasticity Modeling calculates multiaxial mechanical constitutive behavior by treating the sample as an interacting aggregate of single crystals that
Components and devices used in a broad spectrum of technology sectors such as health care, communications, energy and electronics are manufactured from
The definitions of cyber-physical systems (CPS) and the Internet of Things (IoT) are converging over time to include a common emphasis on hybrid systems of
Smart cities are enabled by cyber-physical systems (CPS), which involve connecting devices and systems – such as Internet of Things (IoT) technologies – in
A key challenge to progress in cyber-physical systems (CPS) and the Internet of Things (IoT) is the lack of robust platforms for experiment and testing, which