NIST

Results: 18894



#Item
141Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
142Security / Computer security / Cyberwarfare / Computer network security / Crime prevention / Cryptography / National security / Government procurement in the United States / Critical infrastructure protection / NIST Cybersecurity Framework

DEFENSE CYBERSECURITY REQUIREMENTS: WHAT SMALL BUSINESSES NEED TO KNOW Office of Small Business Programs, U.S. Department of Defense 3600 Defense Pentagon, Room 3E185, Washington, DCWhy is cybersecurity impor

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
143National Institute of Standards and Technology / Advisory Committee on Earthquake Hazards Reduction / Economy of the United States / Psychological resilience / United States Geological Survey / NIST / Government / Geography

NATIONAL EARTHQUAKE HAZARDS REDUCTION PROGRAM (NEHRP) ADVISORY COMMITTEE ON EARTHQUAKE HAZARDS REDUCTION (ACEHR) 3-4 MARCH 2016 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY ADMINISTRATION BUILDING, HERITAGE ROOM 100 BU

Add to Reading List

Source URL: www.nehrp.gov

Language: English - Date: 2016-03-03 11:34:47
144Engineering / Construction / Real estate / Building engineering / Civil engineering / Carbon fiber reinforced polymer / Strength of materials / Deflection / Structural engineering / Load testing

Gold, W.J. and A. Nanni," In-situ Load Testing to Evaluate New Repair Techniques," Proceedings, NIST Workshop on Standards Development for the Use of FRP for the Rehabilitation of Concrete and Masonry Structures, Tucson,

Add to Reading List

Source URL: rb2c.mst.edu

Language: English - Date: 2014-01-22 05:22:28
145Visual arts / Intelligence Advanced Research Projects Activity / Quantum computing / Evaluation / Air Force Research Laboratory / Paul Klee / Modern art

AFRL-RY-WP-TRMINESTRONE Salvatore Stolfo, Angelos D. Keromytis, Junfeng Yang, Dimitris Geneiatakis, Michalis Polychronakis, Georgios Portokalidis, Kangkook Jee, and Vasileios P. Kemerlis

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
146Cryptography / Security / Computer security / Key management / Computer network security / National security / USB flash drive / FIPS 140 / Critical Security Parameter / Key / Password / Zeroisation

iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-15 09:06:22
147Emergency management / Prevention / Safety / National Institute of Standards and Technology / Psychological resilience / Resilience / Community resilience / Naval Acquisition Career Center

NIST Hiring Systems Modelers for Community Resilience Program Civil Engineer ZP-0810-III/IV, Industrial Engineer ZP-0896-III/IV, or Community Planner, ZP-0020-III/IV National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: mae.cee.illinois.edu

Language: English - Date: 2016-04-14 23:53:03
148Information retrieval evaluation / Information science / Bioinformatics / Precision and recall / Information

Waterloo (Cormack) Participation in the TREC 2015 Total Recall Track Gordon V. Cormack, University of Waterloo Maura R. Grossman, Wachtell, Lipton, Rosen & Katz ⇤ January 24, 2016 In the course of developing tools for

Add to Reading List

Source URL: trec.nist.gov

Language: English - Date: 2016-02-19 16:13:17
149

PDF Document

Add to Reading List

Source URL: www.boulder.nist.gov

- Date: 2006-10-04 10:21:00
    150Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

    FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-05-26 13:27:36
    UPDATE