Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Projects

Showing 11 through 20 of 67 matching records.
Block Cipher Techniques
Approved AlgorithmsCurrently, there are two (2) Approved* block cipher algorithms that can be used for both applying cryptographic protection (e.g., encryption) and removing or verifying the protection that was previously applied (e.g., decryption): AES...
Circuit Complexity
Boolean functions for a wide class of applications (such as encryption, digital signatures, hashing, and error correction codes) can be implemented as electronic circuits. In practice, it is important to be able to minimize the size and depth of these...
Cloud Computing
NIST Cloud Computing ProgramCloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...
Computer Security Objects Register CSOR
Information objects that convey information used to maintain the security of resources in computerized environments are known as Computer Security Objects (CSOs). The Computer Security Objects Register (CSOR) specifies names that uniquely identify CSOs....
Continuous Monitoring ConMon
To advance the state of the art in continuous monitoring capabilities and to further interoperability within commercially available tools, the Computer Security Division is working within the international standards development community to establish...
Crypto Reading Club
The Computer Security Division hosts Crypto Reading Club talks to foster research and collaboration in cryptography.When:Wednesday (bi-weekly), 10:00am-12:00pm (Eastern Time), unless noted otherwise.Where:NIST Building 222, Room B341 Gaithersburg,...
Cryptographic Algorithm Validation Program CAVP
The Cryptographic Algorithm Validation Program (CAVP) provides validation testing of FIPS-approved and NIST-recommended cryptographic algorithms and their individual components. Cryptographic algorithm validation is a prerequisite of cryptographic...
Cryptographic Module Validation Program CMVP
What Is The Purpose Of The CMVP?On July 17, 1995, NIST established the Cryptographic Module Validation Program (CMVP) that validates cryptographic modules to Federal Information Processing Standards (FIPS)140-1, Security Requirements for...
Cryptographic Research
NIST continues to develop cryptographic expertise in several research areas:Circuit ComplexityElliptic Curve CryptographyLightweight CryptographyPairing-Based CryptographyPost-Quantum Cryptography (PQC)Privacy-Enhancing CryptographyWe also host a ...
Cryptographic Standards and Guidelines
Users of the former "Crypto Toolkit" can now find that content under this project. It includes cryptographic primitives, algorithms and schemes are described in some of NIST's Federal Information Processing Standards (FIPS), Special Publications (SPs...

<< first   < previous   1     2     3     4     5     6     7  next >  last >>