An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Gorjan Alagic, Maxime Bros, Pierre Ciadoux, David Cooper, Quynh Dang, Thinh Dang, John Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Hamilton Silberg, Daniel Smith-Tone, Noah Waller
The National Institute of Standards and Technology is selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signatures, public-key encryption, and
Sarah Arpin, Jun Bo Lau, Ray Perlner, Angela Robinson, Valentin Vasseur, Jean-Pierre Tillich
Quasi-cyclic moderate-density parity check (QC-MDPC) code-based encryption schemes under iterative decoders offer highly-competitive performance in the quantum-resistant space of cryptography, but the decoding-failure rate (DFR) of these algorithms are not
DJ Anand, Hamid Ossareh, Yasaman Pedari, Collin Freiheit
Real-time constraint management schemes for timevarying or parameter-varying systems often result in conservative (slow) responses or carry a heavy computational burden. This makes some of the existing solutions less suitable for practical applications
The growing demand for wireless communications has caused significant spectrum congestion, requiring multiple WLAN protocols to share limited spectrum resources. To address this, further research is necessary to optimize spectrum sharing and improve
Abstract. A non-iterative direct blind deconvolution procedure, previously used successfully to sharpen Hubble Space Telescope imagery, is now found useful in sharpening nanoscale scanning electron microscope (SEM) and helium ion microscope (HIM) images
Spencer Breiner, Eswaran Subrahmanian, Joseph Moeller, Priyaa Varshinee Srinivasan
The focus of this workshop is to foster the development of applications of category theory to systems engineering and design. We are interested in bringing together experts from engineering and applied category theory, and those involved in software tools
This paper considers the ill-posed data assimilation problem associated with hyper- bolic/parabolic systems describing 2D coupled sound and heat flow. Given hypothetical data at time T > 0, that may not correspond to an actual solution of the dissipative
Mary Gregg, Adam Creuziger, Somnath Datta, Douglas Lorenz
To evaluate variance homogeneity among groups for clustered data, Iachine et al. (Robust tests for the equality of variances for clustered data. J Stat Comput Simul 2010;80(4):365–377) introduced an extension of the well-known Levene test. However, this
Gorjan Alagic, Maxime Bros, Pierre Ciadoux, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Hamilton Silberg, Daniel Smith-Tone, Noah Waller, Yi-Kai Liu
The National Institute of Standards and Technology is in the process of evaluating public-key digital signature algorithms through a public competition-like process for potential standardization. Any signature scheme eventually selected would augment
Algorithms based on gradient descent for computing the elastic shape registration of two simple surfaces in 3−dimensional space and therefore the elastic shape distance between them have been proposed by Kurtek, Jermyn, et al., and more recently by Riseth
Let π = (d1, . . . , dn) be a non-increasing degree sequence with even n. In 1974, Kundu showed that if Dk(π) = (d1 − k, . . . , dn − k) is graphic, then some realization of π has a k-factor. For r ≤ 2, Busch et al. and later Seacrest for r ≤ 4 showed that
A tangential quadrilateral is a convex quadrilateral whose sides are simultaneously tangent to a single circle. In this paper, the primary objective is to construct rational tangen- tial quadrilaterals characterized by having rational area, as well as
Andrew Ackerman, Zhengwu Zhang, Jan Hannig, Jack Prothero, J.S. Marron
Neuroimaging studies, such as the Human Connectome Project (HCP), often collect multifaceted and multi-block data to study the complex human brain. However, these data are often analyzed in a pairwise fashion, which can hinder our understanding of how
Emily Griffith, Julia Sharp, Sarah Peskoe, Alexandra Hanlon, Jennifer Van Mullekom, Bruce Craig
The delivery of academic statistical collaboration resources can vary among types of institutions and across time. In particular, this variation might occur in the management of infrastructure and the business model, the staffing model, and opportunities
The use of quadtrees to tile rectangular domains is a well accepted numerical technique. If each leaf of the quadtree is in turn a two-dimensional bi-variate approximation, a representation of a function $z(x,y)$ can be constructed that covers the entire
Christopher Battarbee, Giacomo Borin, Julian Brough, Ryann Cartor, Tobias Hemmert, Nadia Heninger, David Jao, Delaram Kahrobaei, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, Rainer Steinwandt
We present an efficient quantum algorithm for solving the semidirect discrete logarithm problem (SDLP) in any finite group. The believed hardness of the semidirect discrete logarithm problem underlies more than a decade of works constructing candidate post
Jacob Collard, Valeria de Paiva, Eswaran Subrahmanian
Mathematics is a highly specialized domain with its own unique set of challenges. Despite this, there has been relatively little research on natural language processing for mathematical texts, and there are few mathematical language resources aimed at NLP
Christina Maimone, Julia Sharp, Ofira Schwartz-Soicher, Jeffrey Oliver, Lencia Beltran
Leading a data science or statistical consulting team in an academic environment can have many challenges including institutional infrastructure, funding, and technical expertise. Even in the most challenging environment, however, leading such a team with
Vipin Tondare, Justin Whiting, Adam L. Pintar, Shawn P. Moylan, Aurelien Neveu, Filip Francqui
The National Institute of Standards and Technology (NIST) organized an interlaboratory study to assess the repeatability and reproducibility of the data generated by two commercially available rotating drum powder rheometers namely, Granudrum and
This report summarizes recent technical work of the Applied and Computational Mathematics Di-vision of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). Part I (Overview) provides a high-level overview of
Md. Habibur Rahman, Prince Gollapalli, Panayotis Manganaris, Satyesh Kumar Yadav, Ghanshyam Pilania, Arun Kumar Mannodi-Kanakkithodi, Brian DeCost, Kamal Choudhary
First principles computations reliably predict the energetics of point defects in semiconductors, but are constrained by the expense of using large supercells and advanced levels of theory. Machine learning models trained on computational data, especially
The National Institute of Standards & Technology (NIST) invites educators to discover STEM resources on the NIST Educational STEM Resource (NEST-R) registry! Published by NIST scientists, engineers, & staff, NEST-R content is free & publicly available. It
Finding the k-median in a network involves identifying a subset of k vertices that minimize the total distance to all other vertices in a graph. This problem has been extensively studied in computer science, graph theory, operations research, and numerous
This Recommendation specifies techniques for the derivation of additional keying material from a secret key—either established through a key-establishment scheme or shared through some other manner—using pseudorandom functions: HMAC, CMAC, and KMAC.