Active
Recent
Comments
Search
Login
Login
csrc.nist.gov: 13 stories from 8 submitters
3
Lightweight Cryptography Standardization Process: NIST Selects Ascon
cryptography
security
csrc.nist.gov
via
atoponce
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
NIST issues new call for Post-Quantum Cryptography Digital Signature Schemes
cryptography
csrc.nist.gov
via
atoponce
9 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Proceedings of the 21st NISSC, Early Computer Security Papers (1970-1985)
☶
pdf
historical
security
csrc.nist.gov
via
trn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Recommendation for the Entropy Sources Used for Random Bit Generation
cryptography
csrc.nist.gov
via
trn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
Round 1 Submissions to NIST Post-Quantum Cryptography Project
cryptography
csrc.nist.gov
via
dchest
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
17
NIST to include 25519 and 448 in their approved curves
☶
cryptography
security
csrc.nist.gov
via
utzig
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations, Draft 5.
☶
pdf
practices
privacy
security
csrc.nist.gov
via
trn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Updated NIST Guidance For Bluetooth Security, July 2017
pdf
practices
security
csrc.nist.gov
via
trn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
NIST CSL Bulletin: Guidance on the legality of keystroke monitoring (1993)
historical
law
privacy
security
csrc.nist.gov
via
trn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Simultaneous Testing Using Two-layer Covering Arrays
☶
pdf
testing
csrc.nist.gov
via
355E3B
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
2
Dramatically Reducing Software Vulnerabilities
☶
pdf
security
csrc.nist.gov
via
puffnfresh
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Automatic Combinatorial Testing for Software (ACTS) by NIST
compsci
release
testing
csrc.nist.gov
via
nickpsecurity
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
An Evening With Berferd In Which a Cracker is Lured, Endured, and Studied (1992)
pdf
security
csrc.nist.gov
via
pushcx
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0