CVE-2021-27135: xterm flaw may allow remote code execution, CVSS 9.6

Scientists Create Simple Synthetic Cell That Grows and Divides Normally

Enabling Rich Statistical Analyses with Differential Privacy

Automated Combinatorial Testing for Software – Acts

NIST Digital Library of Mathematical Functions

Paving the Way for Electronic Organs-on-a-Chip

Researchers have invented a miniature thermometer with big potential applications, such as monitoring the temperature of processor chips in superconductor-based quantum computers…

NIST Pair of Atomic Clocks Reveal Einstein's Relativity at a Personal Scale

Scientists proposed a novel method for finding dark matter

Threat Models for Differential Privacy

NIST Samate – Source Code Security Analyzers

Keeping Time at NIST

Painting With Light: Novel Nanopillars Precisely Control the Color and Intensity of Transmitted Light

A new design for light-emitting diodes achieves a dramatic increase in brightness as well as the ability to create laser light - characteristics that could make it valuable in a range of applications

Status Report on the Second Round of NIST Post-Quantum Cryptography Standardization

NIST’s Post-Quantum Cryptography Program Enters ‘Selection Round’

PuTTY 0.68 = 0.73: Observable Discrepancy leading to a leak in the algo nego

Bob, PML's Second “Primary” Coordinate Measuring Machine (2016)

Expect: Scripts for Controlling Interactive Processes

NIST Handbook of Engineering Statistics

Discarded cigarette butts continue to emit nicotine and other toxic substances into air for several days after a cigarette has been extinguished, new study shows

U.S. Survey Foot

NIST Releases Version 1.0 of Privacy Framework

The Economic Impacts of the Advanced Encryption Standard (2018)

Why Is UTC Used as the Acronym for Coordinated Universal Time Instead of CUT?

NIST-F1 Cesium Fountain Atomic Clock

Backdoor Found in Cisco Routers CVE-2019-1804

CVE-2019-3855: out of bounds write in libssh2 before 1.8.1

NIST 800-63B Digital Identity Guidelines

CVE-2019-9191 – eTLS protocol does not provide per-session forward secrecy

More →