U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.


Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Showing 4 matching records.
Entropy as a Service EaaS
Cryptography is critical for securing data at rest or in transit over the IoT. But cryptography fails when a device uses easy-to-guess (weak) keys generated from low-entropy random data. Standard deterministic computers have trouble producing good randomness, especially resource-constrained IoT-class devices that have little opportunity to collect local entropy before they begin network communications. The best sources of true randomness are based on unpredictable physical phenomena, such as...
Masked Circuits for Block-Ciphers
A main goal of circuit masking is to make more difficult the illegitimate exfiltration of secrets from a circuit evaluation. Masking schemes use secret-sharing of the input bits of a circuit and recompile the circuit logic to ensure that important properties of the secret sharing remain across the circuit evaluation. At this stage, the Masked Circuits (MC) project is not considering actions toward standardization. However, there is a plan to create a library of masked circuits (specified at the...
Multi-Party Threshold Cryptography MPTC
The multi-party paradigm of threshold cryptography enables threshold schemes, for a secure distribution of trust in the operation of cryptographic primitives. September 26–28, 2023: Workshop MPTS 2023 (Multi-Party Threshold Schemes) [fully virtual], for collection of further feedback about the Threshold Call. There is a call for submissions of presentation abstracts (the deadline is 2023-Sep-05). Upcoming (expected for late 2023): Revised version of NIST IR 8214C ipd: NIST First Call for...
Random Bit Generation RBG
Include revised/updated text from  http://csrc.nist.gov/groups/ST/toolkit/rng/index.html ??   --> Cryptography and security applications make extensive use of random numbers and random bits. However, constructing random bit generators and validating these generators are very challenging. The SP 800 90 series provides guidelines and recommendations for generating random numbers for cryptographic use, and has three parts: SP 800-90A, Recommendation for Random Number Generation Using...