Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Hardware Security Failure Scenarios

Author(s)
Peter Mell, Irena Bojanova
Historically, hardware has been assumed to be inherently secure. However, chips are both created with software and contain complex encodings (e.g., circuit

Base de referencia de las capacidades de apoyo no técnicas del IoT

Author(s)
Michael Fagan, Katerina Megas, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebecca Herold
Las capacidades de apoyo no técnicas son acciones que realiza un fabricante o una organización de terceros en apoyo de la seguridad cibernética de un

Base Principal da Capacidade de Suporte Não Técnico da IoT

Author(s)
Katerina Megas, Michael Fagan, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebbecca Herold
Recursos de suporte não técnicos são ações que um fabricante ou organização terceirizada executa em apoio à segurança cibernética de um dispositivo IoT. Esta

Strategic Plan for the Manufacturing USA Program

Author(s)
Robert G. Rudnitsky, Clifton Ray, Said Jahanmir
This document is the triennial strategic plan for the Manufacturing USA Program, as required by the program's authorizing statute. This strategic plan addresses

The Global and Local Structure of Medium-Scale Pool Fires

Author(s)
Kunhyuk Sung, Ryan Falkenstein-Smith, Matthew Bundy, Marco Fernandez, Anthony Hamins
A series of experiments are reported that characterize key features of the structure of eight medium-scale pool fires (0.3 m to 0. 4 m) burning a variety of

Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process

Author(s)
Gorjan Alagic, Maxime Bros, Pierre Ciadoux, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Hamilton Silberg, Daniel Smith-Tone, Noah Waller, Yi-Kai Liu
The National Institute of Standards and Technology is in the process of evaluating public-key digital signature algorithms through a public competition-like

Service Mesh Proxy Models for Cloud-Native Applications

Author(s)
Ramaswamy Chandramouli, Zack Butcher, James Callaghan
The service mesh has become the de facto application services infrastructure for cloud-native applications. It enables the various runtime functions of an

A Guide to the Smart Investment Tools

Author(s)
Douglas Thomas, Joshua D. Kneifel, Purav Parekh
This report serves as a guide to the Smart Investment Tool and Smart Investment Tool Express (SITExpress). These tools aid a user in conducting an investment

TREC 2015 Dynamic Domain Track Overview

Author(s)
Ian Soboroff, Hui Yang, John Frank
Search tasks for professional searchers, such as law enforcement agencies, police officers, and patent examiners, are often more complex than open domain Web
Was this page helpful?