NIST

Results: 18894



#Item
391

NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags; (THIRD Draft)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-08-31 15:15:45
    392

    Symantec’s View of the Current State of ECDSA on the Web Rick Andrews Senior Technical Director and Distinguished Engineer Agenda

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-06-11 09:56:43
      393Concrete / Building materials / Masonry / Pavements / Types of concrete / Cement

      MIXTURE PROPORTIONING WITH INTERNAL CURING

      Add to Reading List

      Source URL: ciks.cbt.nist.gov

      Language: English - Date: 2007-05-16 09:15:40
      394

      Track Changes for Draft SPPart 1 from Revision 3 TO Revision 4

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-09-10 14:54:31
        395

        National Institute of Standards and Technology l Technology Administration l Department of Commerce Baldrige National Quality Program

        Add to Reading List

        Source URL: patapsco.nist.gov

        Language: English - Date: 2007-04-09 08:16:18
          396

          Proceedings NIST Text Analysis Conference, Gaithersburg, MD, Utterance Topic Model for Generating Coherent Summaries Pradipto Das Rohini Srihari

          Add to Reading List

          Source URL: www.cedar.buffalo.edu

          Language: English - Date: 2011-07-11 12:34:11
            397Reconfigurable computing / Electronic engineering / Fabless semiconductor companies / Electronics / Computing / Xilinx / Field-programmable gate array / Virtex / Application-specific integrated circuit / Logic block / SciEngines GmbH

            High Performance ECC over NIST Primes on Commercial FPGAs ECC 2008, Utrecht, September 22-24, 2008 Tim Güneysu Horst Görtz Institute for IT-Security Ruhr University of Bochum, Germany

            Add to Reading List

            Source URL: www.hyperelliptic.org

            Language: English - Date: 2008-10-27 20:01:32
            398

            Contact: James Lyle Computer Forensics Tool Testing Program Office of Law Enforcement Standards National Institute of Standards and Technology

            Add to Reading List

            Source URL: www.cftt.nist.gov

            Language: English - Date: 2015-08-11 11:54:26
              399Key management / Cryptography standards / Cryptography / FIPS 201 / Standards / Key size / Cryptographic hash function / Key / Cryptographic Module Validation Program / Digital Signature Algorithm / Public-key cryptography / Smart card

              NIST Special Publication

              Add to Reading List

              Source URL: nvlpubs.nist.gov

              Language: English - Date: 2015-06-10 13:59:58
              400Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

              Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

              Add to Reading List

              Source URL: www.hyperelliptic.org

              Language: English - Date: 2008-09-27 14:59:29
              UPDATE