Transitioning the Use of Cryptographic Algorithms and Key Lengths

NIST Interoperable Randomness Beacons

Bridging the Gap between Standards on Random Number Generation: Comparison of SP 800-90 Series and AIS 20/31

FIPS Post Quantum Crypto standards approved

Lightweight Cryptography Standardization Process: NIST Selects Ascon

NIST issues new call for Post-Quantum Cryptography Digital Signature Schemes

The NIST post-quantum crypto algorithm selection has concluded

Lightweight Cryptography

Automated Combinatorial Testing for Software – Acts

NIST: Computer Security Resource Center Glossary

NIST: Usability and Key Management

Proceedings of the 21st NISSC, Early Computer Security Papers (1970-1985)

Recommendation for the Entropy Sources Used for Random Bit Generation

Round 1 Submissions to NIST Post-Quantum Cryptography Project

NIST Post-Quantum Cryptography Round 1 Submissions

NIST to include 25519 and 448 in their approved curves

NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations, Draft 5.

Updated NIST Guidance For Bluetooth Security, July 2017

NIST CSL Bulletin: Guidance on the legality of keystroke monitoring (1993)

Simultaneous Testing Using Two-layer Covering Arrays

Dramatically Reducing Software Vulnerabilities

Automatic Combinatorial Testing for Software (ACTS) by NIST

An Evening With Berferd In Which a Cracker is Lured, Endured, and Studied (1992)