U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1226 through 1250 of 13539 matching records.
Publications Conference Proceedings July 15, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/07/15/casfinder-detecting-common-attack-surface

Conference: IFIP Annual Conference on Data and Applications Security and Privacy Abstract: Code reusing is a common practice in software development due to its various benefits. Such a practice, however, may also cause large scale security issues since one vulnerability may appear in many different software due to cloned code fragments. The well known concept of relying on software divers...

Publications White Paper NIST Technical Note (TN) 2051 July 9, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/07/09/nist-tn-2051-cybersecurity-framework-smart-grid-profile/final

Abstract: The Smart Grid Profile applies risk management strategies from the Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework) to the smart grid and will serve as a foundation for refinements to support new grid architectures. The Profile provides cybersecurity risk manag...

Publications NISTIR 7298 Rev. 3 July 3, 2019
https://csrc.nist.rip/publications/detail/nistir/7298/rev-3/final

Abstract: This publication describes an online glossary of terms used in National Institute of Standards and Technology (NIST) and Committee on National Security Systems (CNSS)  publications. This glossary utilizes a database of terms extracted from NIST Federal Information Processing Standards (FIPS), t...

Publications Journal Article July 1, 2019
https://csrc.nist.rip/publications/detail/journal-article/2019/on-addition-subtraction-chains-of-nums-with-low-hamming-weight

Journal: Notes on Number Theory and Discrete Mathematics Abstract: An addition chain is a sequence of integers such that every element in the sequence is the sum of two previous elements. They have been much studied, and generalized to additions-subtraction chains, Lucas chains, and Lucas addition-subtraction chains. These various chains have been useful in finding...

Publications SP 1800-14 June 28, 2019
https://csrc.nist.rip/publications/detail/sp/1800-14/final

Abstract: The Border Gateway Protocol (BGP) is the default routing protocol to route traffic among internet domains. While BGP performs adequately in identifying viable paths that reflect local routing policies and preferences to destinations, the lack of built-in security allows the protocol to be exploited...

Publications NISTIR 8228 June 25, 2019
https://csrc.nist.rip/publications/detail/nistir/8228/final

Abstract: The Internet of Things (IoT) is a rapidly evolving and expanding collection of diverse technologies that interact with the physical world. Many organizations are not necessarily aware of the large number of IoT devices they are already using and how IoT devices may affect cybersecurity and privacy r...

Publications Conference Proceedings June 24, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/06/24/searching-for-best-karatsuba-becurrences

Conference: International Symposium on Experimental Algorithms Abstract: Efficient circuits for multiplication of binary polynomials use what are known as Karatsuba recurrences. These methods divide the polynomials of size (i.e. number of terms) k⋅n into k pieces of size n. Multiplication is performed by treating the factors as degree- (k−1) polynomials, with multiplicat...

Publications Conference Proceedings June 20, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/06/20/motivating-cybersecurity-advocates-recruitment-and-retention

Conference: 55th ACM Conference on Computers and People Research (SIGMIS-CPR '19) Abstract: Given modern society's dependence on technological infrastructure vulnerable to cyber-attacks, the need to expedite cybersecurity adoption is paramount. Cybersecurity advocates are a subset of security professionals who promote, educate about, and motivate adoption of security best practices and tec...

Publications SP 800-205 June 18, 2019
https://csrc.nist.rip/publications/detail/sp/800-205/final

Abstract: This document provides federal agencies with a guide for implementing attributes in access control systems. Attributes enable a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested...

Publications White Paper (Draft) June 17, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/06/17/continuous-monitoring-for-it-infrastructure-for-smb/draft

Abstract: Many organizations monitor business information technology (IT) infrastructure by manual inspection or computer-aided audits, which can result in after-the-fact detection of malicious-user access events. This project explores continuous monitoring capabilities that can effectively, efficiently, a...

Publications NISTIR 8221 June 5, 2019
https://csrc.nist.rip/publications/detail/nistir/8221/final

Abstract: Hardware/Server Virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to shared system resources. Server virtualization is typically performed by a hypervisor, which provides mechanisms to abstract hardware and syste...

Publications Journal Article June 1, 2019
https://csrc.nist.rip/publications/detail/journal-article/2019/electronics-supply-chain-integrity-enabled-by-blockchain

Journal: ACM Transactions on Design Automation of Electronic Systems Abstract: Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives, as well as in critical infrastructures such as power grids, satellite communications, and public transportation. In the past few decades, the security of software running on these systems has received signi...

Publications Journal Article May 27, 2019
https://csrc.nist.rip/publications/detail/journal-article/2019/graphical-methods-in-device-independent-quantum-cryptography

Journal: Quantum: The Open Journal for Quantum Science Abstract: We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography more accessible, facilitate the discovery of...

Publications SP 800-57 Part 2 Rev. 1 May 23, 2019
https://csrc.nist.rip/publications/detail/sp/800-57-part-2/rev-1/final

Abstract: NIST Special Publication (SP) 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements. Finally, Pa...

Publications White Paper (Draft) May 22, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/05/22/combinatorial-methods-for-explainability-in-ai-and-ml/draft

Abstract: This short paper introduces an approach to producing explanations or justifications of decisions made in some artificial intelligence and machine learning (AI/ML) systems, using methods derived from those for fault location in combinatorial testing. We show that validation and explainability issues...

Publications NISTIR 8227 May 22, 2019
https://csrc.nist.rip/publications/detail/nistir/8227/final

Abstract: The National Institute of Standards and Technology has constructed a testbed to measure the performance impact of cybersecurity technologies on Industrial Control Systems (ICS). The testbed was chosen to support the implementation of the Cybersecurity Framework Manufacturing Profile: a voluntary, ri...

Publications NISTIR 8177 May 21, 2019
https://csrc.nist.rip/publications/detail/nistir/8177/final

Abstract: The National Institute of Standards and Technology has constructed a testbed to measure the performance impact of cybersecurity defenses on Industrial Control Systems (ICS). The testbed allows researchers to emulate real-world industrial manufacturing processes and their control systems without repl...

Publications ITL Bulletin May 20, 2019
https://csrc.nist.rip/publications/detail/itl-bulletin/2019/05/fips-140-3-adopts-iso/iec-standards/final

Abstract: This bulletin summarizes the information found in FIPS 140-3: Security Requirements for Cryptographic Modules which is applicable to all federal agencies that use cryptographic-based security systems to provide adequate information security for all agency operations and assets as defined in 15 U.S.C...

Publications NISTIR 8183 May 20, 2019
https://csrc.nist.rip/publications/detail/nistir/8183/final

Abstract: This document provides the Cybersecurity Framework (CSF) implementation details developed for the manufacturing environment. The "Manufacturing Profile" of the Cybersecurity Framework can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing s...

Publications Conference Proceedings May 15, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/05/15/post-quantum-crypto-and-5g-security-tutorial

Conference: 12th ACM Conference on Security and Privacy in Wireless and Mobile Network Abstract: The Fifth Generation (5G) mobile broadband standards make a fundamental shift in cryptography. Prior generations based their security and privacy principally on symmetric key cryptography. The Subscriber Identity Module (SIM) and its successors contain a shared key used to authenticate the User Equi...

Publications White Paper May 13, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/05/13/securing-telehealth-remote-patient-monitoring-ecosystem/final

Abstract: HDOs are leveraging a combination of telehealth capabilities, such as remote patient monitoring (RPM) and videoconferencing, to treat patients in their homes. These modalities are used to treat numerous conditions, such as patients battling chronic illness or requiring postoperative monitoring. As u...

Publications Conference Proceedings May 8, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/05/08/constant-round-group-key-exchange-from-the-ring-lwe-assumption

Conference: 10th International Conference on Post-Quantum Cryptography (PQCrypto 2019) Abstract: Group key-exchange protocols allow a set of N parties to agree on a shared, secret key by communicating over a public network. A number of solutions to this problem have been proposed over the years, mostly based on variants of Diffie-Hellman (two-party) key exchange; to the best of our knowledge, h...

Publications NISTIR 8213 (Draft) May 6, 2019
https://csrc.nist.rip/publications/detail/nistir/8213/draft

Abstract: A randomness beacon produces timed outputs of fresh public randomness. Each output, called a pulse, also includes metadata and cryptographic elements to support several security and usability features. This document specifies a reference “version 2” of a format for pulses and of a protocol for beaco...

Publications Conference Proceedings April 23, 2019
https://csrc.nist.rip/publications/detail/conference-paper/2019/04/23/rtl-psc

Conference: IEEE VLSI Test Symposium 2019 Abstract: Power side-channel attacks (SCAs) have become a major concern to the security community due to their noninvasive feature, low-cost, and effectiveness in extracting secret information from hardware implementation of crypto algorithms. Therefore, it is imperative to evaluate if the hardware is vulnera...

Publications White Paper NIST CSWP 8 April 22, 2019
https://csrc.nist.rip/publications/detail/white-paper/2019/04/22/bowtie---a-deep-learning-feedforward-neural-network/final

Abstract: How to model and encode the semantics of human-written text and select the type of neural network to process it are not settled issues in sentiment analysis. Accuracy and transferability are critical issues in machine learning in general. These properties are closely related to the loss estimates fo...

<< first   < previous   38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57     58     59     60     61     62  next >  last >>