U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1126 through 1150 of 13539 matching records.
Publications Conference Proceedings July 27, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/07/27/systems-security-assurance-as-micro-publishing

Conference: Balisage: The Markup Conference 2020 Abstract: Markup technologies are very general purpose, as reflects their generality of conception. They become interesting as well as useful as they are applied to accomplish goals in the real world. Since principles of generic declarative markup were first applied to accomplishing publishing-related goals i...

Publications NISTIR 8309 July 22, 2020
https://csrc.nist.rip/publications/detail/nistir/8309/final

Abstract: The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify one or more additional digital signatures, public-key encryption, and k...

Publications Conference Proceedings July 19, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/07/19/smart-home-security-and-privacy-mitigations

Conference: Second International Conference on Human-Computer Interaction for Cybersecurity, Privacy and Trust (HCI-CPT 2020) Abstract: As smart home technology is becoming pervasive, smart home devices are increasingly being used by non-technical users who may have little understanding of the technology or how to properly mitigate privacy and security risks. To better inform security and privacy mitigation guidance for smart home d...

Publications Journal Article July 18, 2020
https://csrc.nist.rip/publications/detail/journal-article/2020/boolean-functions-with-multiplicative-complexity-3-and-4

Journal: Cryptography and Communications Abstract: Multiplicative complexity (MC) is defined as the minimum number of AND gates required to implement a function with a circuit over the basis (AND, XOR, NOT). Boolean functions with MC 1 and 2 have been characterized in Fisher and Peralta (2002), and Find et al. (IJICoT 4(4), 222–236, 2017), respectiv...

Publications NISTIR 8219 July 16, 2020
https://csrc.nist.rip/publications/detail/nistir/8219/final

Abstract: Industrial control systems (ICS) are used in many industries to monitor and control physical processes. As ICS continue to adopt commercially available information technology (IT) to promote corporate business systems’ connectivity and remote access capabilities, ICS become more vulnerable to cybers...

Publications Conference Proceedings July 13, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/07/13/a-suite-of-metrics-for-calculating-software-flaw-types

Conference: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) Abstract: The Common Weakness Enumeration (CWE) is a prominent list of software weakness types. This list is used by vulnerability databases to describe the underlying security flaws within analyzed vulnerabilities. This linkage opens the possibility of using the analysis of software vulnerabilities to identi...

Publications NISTIR 8214A July 7, 2020
https://csrc.nist.rip/publications/detail/nistir/8214a/final

Abstract: This document constitutes a preparation toward devising criteria for the standardization of threshold schemes for cryptographic primitives by the National Institute of Standards and Technology (NIST). The large diversity of possible threshold schemes, as identified in the NIST Internal Report (NISTI...

Publications SP 800-77 Rev. 1 June 30, 2020
https://csrc.nist.rip/publications/detail/sp/800-77/rev-1/final

Abstract: Internet Protocol Security (IPsec) is a widely used network layer security control for protecting communications. IPsec is a framework of open standards for ensuring private communications over Internet Protocol (IP) networks. IPsec configuration is usually performed using the Internet Key Exchange...

Publications Conference Proceedings June 29, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/06/29/evolving-advanced-persistent-threat-detection

Conference: 2020 IEEE Conference on Communications and Network Security (CNS) Abstract: Advanced persistent threats (APT) have increased in recent times as a result of the rise in interest by nation-states and sophisticated corporations to obtain high profile information. Typically, APT attacks are more challenging to detect since they leverage zero-day attacks and commonly used benign...

Publications ITL Bulletin June 24, 2020
https://csrc.nist.rip/publications/detail/itl-bulletin/2020/06/nist-privacy-framework/final

Abstract: This bulletin summarizes the information found in the voluntary NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (Version 1.0). The Privacy Framework is a tool developed in collaboration with stakeholders intended to help organizations identify and manage priva...

Publications Conference Proceedings June 22, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/06/22/the-impossibility-of-efficient-quantum-weak-coin-flipping

Conference: 52nd Annual ACM Symposium on Theory of Computing (STOC 2020) Abstract: How can two parties with competing interests carry out a fair coin flip across a quantum communication channel? This problem (quantum weak coin-flipping) was formalized more than 15 years ago, and, despite some phenomenal theoretical progress, practical quantum coin-flipping protocols with vanishing...

Publications White Paper June 20, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/06/20/rainbow-band-separation-is-better-than-we-thought/final

Abstract: Currently the National Institute of Standards and Technology (NIST) is engaged in a post- quantum standardization effort, analyzing numerous candidate schemes to provide security against the advancing threat of quantum computers. Among the candidates in the second round of the standardization proces...

Publications SP 1800-16 June 16, 2020
https://csrc.nist.rip/publications/detail/sp/1800-16/final

Abstract: This NIST Cybersecurity Practice Guide shows large and medium enterprises how to employ a formal TLS certificate management program to address certificate-based risks and challenges. It describes the TLS certificate management challenges faced by organizations; provides recommended best practices fo...

Publications SP 800-133 Rev. 2 June 4, 2020
https://csrc.nist.rip/publications/detail/sp/800-133/rev-2/final

Abstract: Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorith...

Publications White Paper May 29, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/05/29/notes-on-interrogating-random-quantum-circuits/final

Abstract: Consider a quantum circuit that, when fed a constant input, produces a fixed-length random bit-string in each execution. Executing it many times yields a sample of many bit-strings that contain fresh randomness inherent to the quantum evaluation. When the circuit is freshly selected from a special c...

Publications NISTIR 8259 May 29, 2020
https://csrc.nist.rip/publications/detail/nistir/8259/final

Abstract: Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT devices they make are by providing necessary cyber...

Publications NISTIR 8259A May 29, 2020
https://csrc.nist.rip/publications/detail/nistir/8259a/final

Abstract: Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device hardware and software). This publication defines an Internet of Things (IoT) device cybersecurity capability core baseline, which is a set of devic...

Publications SP 800-204A May 27, 2020
https://csrc.nist.rip/publications/detail/sp/800-204a/final

Abstract: The increasing trend in building microservices-based applications calls for addressing security in all aspects of service-to-service interactions due to their unique characteristics. The distributed cross-domain nature of microservices needs secure token service (STS), key management and encryption...

Publications SP 800-137A May 21, 2020
https://csrc.nist.rip/publications/detail/sp/800-137a/final

Abstract: This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs within federal, state, and local governmental organizations and commercial enterprises. An ISCM program assessment provides o...

Publications SP 1800-23 May 20, 2020
https://csrc.nist.rip/publications/detail/sp/1800-23/final

Abstract: Industrial control systems (ICS) compose a core part of our nation’s critical infrastructure. Energy sector companies rely on ICS to generate, transmit, and distribute power and to drill, produce, refine, and transport oil and natural gas. Given the wide variety of ICS assets, such as programmable l...

Publications Conference Paper May 18, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/05/18/defining-actionable-rules-for-verifying-iot-security

Conference: 41st IEEE Symposium on Security and Privacy Abstract: Internet of Things (IoT) is being widely adopted in recent years. Security, however, has lagged behind, as evidenced by the increasing number of attacks that use IoT devices (e.g., an arson that uses a smart oven, burglary via a smart lock). Therefore, the transparency and accountability of those de...

Publications NISTIR 8196 May 11, 2020
https://csrc.nist.rip/publications/detail/nistir/8196/final

Abstract: Public safety practitioners utilizing the forthcoming Nationwide Public Safety Broadband Network (NPSBN) will have smartphones, tablets, and wearables at their disposal. Although these devices should enable first responders to complete their missions, any influx of new technologies will introduce ne...

Publications SP 800-57 Part 1 Rev. 5 May 4, 2020
https://csrc.nist.rip/publications/detail/sp/800-57-part-1/rev-5/final

Abstract: This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the...

Publications NISTIR 8294 April 29, 2020
https://csrc.nist.rip/publications/detail/nistir/8294/final

Abstract: Electric vehicles are becoming common on the Nation’s roads, and the electric vehicle supply equipment infrastructure (EVSE) is being created to support that growth. The NIST Information Technology Lab (ITL) hosted a one-day symposium to showcase federally funded research into the potential cybersec...

<< first   < previous   34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57     58  next >  last >>