U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1176 through 1200 of 13539 matching records.
Publications White Paper NIST CSWP 11B February 4, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/02/04/case-studies-in-cyber-scrm-consumer-goods-company/final

Abstract: The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally published in 2015 with the goals of covering...

Publications White Paper NIST CSWP 11D February 4, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/02/04/case-studies-in-cyber-scrm-mayo-clinic/final

Abstract: The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally published in 2015 with the goals of covering...

Publications White Paper NIST CSWP 11F February 4, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/02/04/case-studies-in-cyber-scrm-seagate-technology/final

Abstract: The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally published in 2015 with the goals of covering...

Publications White Paper NIST CSWP 11A February 4, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/02/04/case-studies-in-cyber-scrm-consumer-electronics-company/final

Abstract: The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally published in 2015 with the goals of covering...

Publications White Paper NIST CSWP 11 February 4, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/02/04/case-studies-in-c-scrm-summary-of-findings-and-recommendations/final

Abstract: This document is part of Case Studies in Cyber Supply Chain Risk Management-new research that builds on the CSD C-SCRM program's 2015 publications aimed at identifying how C-SCRM practices have evolved. For this case study series, NIST conducted interviews with 16 subject matter experts across a div...

Publications White Paper NIST CSWP 11E February 4, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/02/04/case-studies-in-cyber-scrm-palo-alto-networks-inc/final

Abstract: The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally published in 2015 with the goals of covering...

Publications White Paper NIST CSWP 11C February 4, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/02/04/case-studies-in-cyber-scrm-renewable-energy-company/final

Abstract: The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally published in 2015 with the goals of covering...

Publications Journal Article February 1, 2020
https://csrc.nist.rip/publications/detail/journal-article/2020/moment-subset-sums-over-finite-fields

Journal: Finite Fields and Their Applications Abstract: The k-subset sum problem over finite fields is a classical NP-complete problem. Motivated by coding theory applications, a more complex problem is the higher m-th moment k-subset sum problem over finite fields. We show that there is a deterministic polynomial time algorithm for the&nb...

Publications Journal Article February 1, 2020
https://csrc.nist.rip/publications/detail/journal-article/2020/new-mission-and-opportunity-for-mathematics-researchers

Journal: Advances in Mathematics of Communications Abstract: This article introduces the NIST post-quantum cryptography standardization process. We highlight the challenges, discuss the mathematical problems in the proposed post-quantum cryptographic algorithms and the opportunities for mathematics researchers to contribute.

Publications White Paper January 29, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/01/29/selfish-mining/final

Abstract: The selfish mining attack allows cryptocurrency miners to mine more than their "fair share" of blocks, stealing revenue from other miners while reducing the overall security of payments. This malicious strategy has been extensively studied in Bitcoin, but far less attention has been paid to how the...

Publications White Paper NIST CSWP 10 January 16, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/01/16/nist-privacy-framework-version-10/final

Abstract: This publication describes the voluntary NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (Version 1.0). The Privacy Framework is a tool developed in collaboration with stakeholders intended to help organizations identify and manage privacy risk to build innova...

Publications Journal Article January 15, 2020
https://csrc.nist.rip/publications/detail/journal-article/2020/input-space-coverage-matters

Journal: Computer Abstract: Testing is the most commonly used approach for software assurance, yet it remains as much judgment and art as science. We suggest that structural coverage measures must be supplemented with measures of input space coverage, providing a means of verifying that an adequate input model has been defined...

Publications White Paper NIST CSWP 9 January 14, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/01/14/a-taxonomic-approach-to-understanding-emerging-blockchain-idms/final

Abstract: Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing within organizations and on the web. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issu...

Publications Conference Proceedings January 6, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/01/06/forensic-analysis-of-apt-attacks-in-cloud-environments

Conference: Sixteenth IFIP 11.9 International Conference on Digital Forensics Abstract: Cloud forensic investigations involve large volumes of diverse devices and data. Investigations involving advanced persistent threat attacks involve filtering noisy data and using expert knowledge to identify the missing steps in the attacks that typically have long time spans. Under such circumstan...

Publications SP 800-189 December 17, 2019
https://csrc.nist.rip/publications/detail/sp/800-189/final

Abstract: In recent years, numerous routing control plane anomalies, such as Border Gateway Protocol (BGP) prefix hijacking and route leaks, have resulted in denial-of-service (DoS), unwanted data traffic detours, and performance degradation. Large-scale distributed denial-of-service (DDoS) attacks on servers...

Publications White Paper December 5, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/12/05/identifying-and-protecting-assets-and-data-against-data-breaches/final

Abstract: An organization must protect its information from unauthorized access and disclosure. Data breaches large and small can have far-reaching operational, financial, and reputational impacts. The goal of this project is to provide a practical solution to identify and protect the confidentiality of an en...

Publications White Paper December 5, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/12/05/detect-respond-to-and-recover-from-data-breaches/final

Abstract: An organization must protect its information from unauthorized access and disclosure. Data breaches large and small can have far-reaching operational, financial, and reputational impacts. The goal of this project is to provide a practical solution to detect, respond to, and recover from incidents th...

Publications Journal Article December 1, 2019
https://csrc.nist.rip/publications/detail/journal-article/2019/standardization-of-file-recovery-classification--authentication

Journal: Digital Investigation Abstract: Digital forensics can no longer tolerate software that cannot be relied upon to perform specific functions such as file recovery. Indistinct and non-standardized results increase the risk of misinterpretation by digital forensic practitioners, and hinder automated correlation of file recovery result...

Publications Conference Proceedings November 24, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/11/24/implementing-a-protocol-native-managed-cryptocurrency

Conference: Fourteenth International Conference on Software Engineering Advances (ICSEA 2019) Abstract: Previous work presented a theoretical model based on the implicit Bitcoin specification for how an entity might issue a protocol native cryptocurrency that mimics features of fiat currencies. Protocol native means that it is built into the blockchain platform itself and is not simply a token running...

Publications Conference Proceedings November 24, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/11/24/augmenting-fiat-currency-with-cryptocurrency

Conference: Fourteenth International Conference on Software Engineering Advances (ICSEA 2019) Abstract: In this work, we investigate how the governance features of a managed currency (e.g., a fiat currency) can be built into a cryptocurrency in order to leverage potential benefits found in the use of blockchain technology and smart contracts. The resulting managed cryptocurrency can increase transpare...

Publications White Paper November 24, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/11/24/nonlinear-multivariate-cryptosystem/final

Abstract: We introduce a new technique for building multivariate encryption schemes based on random linear codes. The construction is versatile, naturally admitting multiple modifications. Among these modifications is an interesting embedding modifier -- any efficiently invertible multivariate system can be e...

Publications Journal Article November 11, 2019
https://csrc.nist.rip/publications/detail/journal-article/2019/rethinking-authentication

Journal: IT Professional Abstract: In today's environment, there is little doubt that companies, organizations, and governments must make significant investments in developing, implementing, and supporting authentication for their digital systems. Perhaps because of this, an organization’s IT support center often takes a hard line wh...

Publications FIPS 186-5 (Draft) October 31, 2019
https://csrc.nist.rip/publications/detail/fips/186/5/draft

Abstract: This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidenc...

Publications SP 800-186 (Draft) October 31, 2019
https://csrc.nist.rip/publications/detail/sp/800-186/draft

Abstract: This recommendation specifies the set of elliptic curves recommended for U.S. Government use. In addition to the previously recommended Weierstrass curves defined over prime fields and binary fields, this recommendation includes two newly specified Montgomery curves, which claim increased performanc...

Publications NISTIR 8269 (Draft) October 30, 2019
https://csrc.nist.rip/publications/detail/nistir/8269/draft

Abstract: This NIST Interagency/Internal Report (NISTIR) is intended as a step toward securing applications of Artificial Intelligence (AI), especially against adversarial manipulations of Machine Learning (ML), by developing a taxonomy and terminology of Adversarial Machine Learning (AML). Although AI a...

<< first   < previous   36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57     58     59     60  next >  last >>