Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 2249

Ensuring Reliability Through Combinatorial Coverage Measures

May 14, 2024
Author(s)
M S Raunak, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
A key question in software assurance is, "How much testing is enough?" Coverage criteria such as statement or branch coverage were developed to help answer this question, but we also need to measure whether tests are sufficiently representative of inputs

Access Control on NoSQL Databases

May 7, 2024
Author(s)
Vincent C. Hu
NoSQL database systems and data stores often outperform traditional RDBMS in various aspects, such as data analysis efficiency, system performance, ease of deployment, flexibility/scalability of data management, and users' availability. However, with an

JARVIS-Leaderboard: A Large Scale Benchmark of Materials Design Methods

May 7, 2024
Author(s)
Kamal Choudhary, Daniel Wines, Kevin Garrity, aldo romero, Jaron Krogel, Kayahan Saritas, Panchapakesan Ganesh, Paul Kent, Pascal Friederich, Vishu Gupta, Ankit Agrawal, Pratyush Tiwary, ichiro takeuchi, Robert Wexler, Arun Kumar Mannodi-Kanakkithodi, Avanish Mishra, Kangming Li, Adam Biacchi, Francesca Tavazza, Ben Blaiszik, Jason Hattrick-Simpers, Maureen E. Williams
Reproducibility and validation are major hurdles for scientific development across many fields. Materials science in particular encompasses a variety of experimental and theoretical approaches that require careful benchmarking. Leaderboard efforts have

Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model

April 29, 2024
Author(s)
Kelsey Jackson, Carl A. Miller, Daochen Wang
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversaries. The primary digital signature scheme that

Practical Attack on All Parameters of the DME Signature Scheme

April 28, 2024
Author(s)
Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all the candidates. The public key is constructed from the alternation of very structured linear and non-linear

Incorporating Syncable Authenticators Into NIST SP 800-63B

April 22, 2024
Author(s)
Ryan Galluzzo, Andrew Regenscheid, David Temoshok, Connie LaSalle
This supplement to NIST Special Publication 800-63B, Authentication and Lifecycle Management, provides agencies with additional guidance on the use of authenticators that may be synced between devices.

On Combinatorial Security Testing for the Tor Anonymity Network Client

April 7, 2024
Author(s)
Dimitris Simos, Bernhard Garn, Dominik-Philip Schreiber, Manuel Leithner, D. Richard Kuhn, Raghu N. Kacker
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is important to evaluate not only its functionality, but also the security it provides to its users

Automated Network Programmability Using OpenConfig YANG Models and NETCONF Protocol

April 2, 2024
Author(s)
Abderrahim Amlou, Amar Abane, Mheni Merzouki, Lydia Ait Oucheggou, Zineb Maasaoui, Abdella Battou
This paper introduces a microservice-based architecture designed to enable automation of network programmability and management. Amid the complexity of today's networks and the diversity of equipment, achieving efficient and reliable network

Non-Fungible Token Security

March 1, 2024
Author(s)
Peter Mell, Dylan Yaga
Non-fungible token (NFT) technology provides a mechanism to enable real assets (both virtual and physical) to be sold and exchanged on a blockchain. While NFTs are most often used for autographing digital assets (associating one's name with a digital

XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF

March 1, 2024
Author(s)
John M. Kelsey, Stefan Lucks
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e. a seed drawn from any ramdom source with sufficient entropy. The current paper formalizes a security notion for a DRBG, allowing the attacker to

Challenges of Assured Autonomy

February 28, 2024
Author(s)
D. Richard Kuhn
This article summarizes some recent novel approaches to the problem of verification, testing, and assurance of autonomous systems. These include proxy verification and combinatorial methods for input space coverage measurement, which also has applications

Application of the Hybrid Satellite Network Cybersecurity Framework Profile: An Example Implementation of NIST IR 8441

February 23, 2024
Author(s)
Frederick R. Byers, Dan Mamula, Karri Meldorf, Joseph Brule, Rory Jennings, John Wiltberger, Eugene Craft, John Dombrowski, O'Ryan Lattin, Abdul Noor, Matt Yetto, Aliaksander Mamonau, Oksana Slivina, Jay Sharma, Dr. Kangmin Zheng
The space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The elements of an HSN may have

Combinatorial testing for building reliable systems

February 5, 2024
Author(s)
M S Raunak, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing is an approach where test suites are developed by efficiently covering interactions of parameter values and configuration settings. Multiple studies over the years have shown the interesting phenomenon where almost all defects in a
Displaying 26 - 50 of 2249