Add NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives.pdf 6f42fd0 verified ethanolivertroy commited on Oct 22
Add CMVP Approved Authentication Mechanisms_ CMVP Validation Authority Requirements for ISO_IEC 19790 Annex E and ISO_IEC 24579 Section 6.17.pdf 97223fc verified ethanolivertroy commited on Oct 22
Add PIV Card to Reader Interoperability Guidelines.pdf 46a38bc verified ethanolivertroy commited on Oct 22
Add Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171.pdf 40d417e verified ethanolivertroy commited on Oct 22
Add Security Guidelines for Storage Infrastructure.pdf f06f4e7 verified ethanolivertroy commited on Oct 22
Add Blockchain Networks_ Token Design and Management Overview.pdf d387493 verified ethanolivertroy commited on Oct 22
Add NIST Workshop on the Requirements for an Accordion Cipher Mode 2024_ Workshop Report.pdf 6cba45f verified ethanolivertroy commited on Oct 22
Add Recommendation for Block Cipher Modes of Operation_ the CMAC Mode for Authentication.pdf dc923f5 verified ethanolivertroy commited on Oct 22
Add Requirements for Cryptographic Accordions.pdf 311082c verified ethanolivertroy commited on Oct 22
Add CMVP Documentation Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759.pdf fddb793 verified ethanolivertroy commited on Oct 22
Add Recommendation for Block Cipher Modes of Operation_ Galois_Counter Mode (GCM) and GMAC.pdf 35afcda verified ethanolivertroy commited on Oct 22
Add Workforce Framework for Cybersecurity (NICE Framework).pdf 0d5e1cc verified ethanolivertroy commited on Oct 22
Add Secure Virtual Network Configuration for Virtual Machine (VM) Protection.pdf 8de85e2 verified ethanolivertroy commited on Oct 22
Add Benefits of an Updated Mapping between the NIST Cybersecurity Framework and the NERC Critical Infrastructure Protection Standards.pdf c89699a verified ethanolivertroy commited on Oct 22
Add Stateless Hash-Based Digital Signature Standard.pdf 6a15c42 verified ethanolivertroy commited on Oct 22
Add Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide_ Volume 2 – Process-based Manufacturing System Use Case.pdf b0134b6 verified ethanolivertroy commited on Oct 22
Add Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography.pdf fc56d17 verified ethanolivertroy commited on Oct 22
Add Notional Supply Chain Risk Management Practices for Federal Information Systems.pdf f38e104 verified ethanolivertroy commited on Oct 22
Add Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products.pdf 6468e83 verified ethanolivertroy commited on Oct 22
Add 2020 Cybersecurity and Privacy Annual Report.pdf cb9f064 verified ethanolivertroy commited on Oct 22
Add Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods_ CMVP Validation Authority U.pdf c64fb6a verified ethanolivertroy commited on Oct 22
Add Personal Identity Verification (PIV) of Federal Employees and Contractors.pdf d1f238e verified ethanolivertroy commited on Oct 22
Add Data Confidentiality_ Detect, Respond to, and Recover from Data Breaches.pdf a1a11eb verified ethanolivertroy commited on Oct 22
Add National Online Informative References (OLIR) Program_ Overview, Benefits, and Use.pdf 3588ac3 verified ethanolivertroy commited on Oct 22
Add IoT Device Cybersecurity Guidance for the Federal Government_ Establishing IoT Device Cybersecurity Requirements.pdf 1a6ce01 verified ethanolivertroy commited on Oct 22
Add Methodology for Characterizing Network Behavior of Internet of Things Devices.pdf d3bfd83 verified ethanolivertroy commited on Oct 22
Add Vulnerabilities in Quantum Key Distribution Protocols.pdf 2877cc6 verified ethanolivertroy commited on Oct 22
Add A Review of U.S. and European Security Evaluation Criteria.pdf 09de0cf verified ethanolivertroy commited on Oct 22
Add Foundational PNT Profile_ Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services.pdf e943814 verified ethanolivertroy commited on Oct 22
Add Building a Cybersecurity and Privacy Learning Program.pdf 77e5266 verified ethanolivertroy commited on Oct 22
Add Data Confidentiality_ Identifying and Protecting Assets Against Data Breaches.pdf 680469d verified ethanolivertroy commited on Oct 22
Add 5th Annual PKI R&D Workshop _Making PKI Easy to Use_ Proceedings.pdf 0a320af verified ethanolivertroy commited on Oct 22
Add Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure.pdf b741587 verified ethanolivertroy commited on Oct 22
Add COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0.pdf 4ebb140 verified ethanolivertroy commited on Oct 22
Add Ordered t-way Combinations for Testing State-based Systems.pdf d26174f verified ethanolivertroy commited on Oct 22
Add Computer Security Division 2012 Annual Report.pdf 8a262c9 verified ethanolivertroy commited on Oct 22
Add Assessing Security Requirements for Controlled Unclassified Information.pdf ed10cb9 verified ethanolivertroy commited on Oct 22
Add The Common Configuration Scoring System (CCSS)_ Metrics for Software Security Configuration Vulnerabilities.pdf 1af960c verified ethanolivertroy commited on Oct 22
Add Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series.pdf 3eb7a35 verified ethanolivertroy commited on Oct 22
Add Control Baselines for Information Systems and Organizations.pdf d3dc346 verified ethanolivertroy commited on Oct 22
Add Recommendation for Block Cipher Modes of Operation_ Three Variants of Ciphertext Stealing for CBC Mode.pdf 27e9dbd verified ethanolivertroy commited on Oct 22
Add The Common Misuse Scoring System (CMSS)_ Metrics for Software Feature Misuse Vulnerabilities.pdf 60276e1 verified ethanolivertroy commited on Oct 22
Add ISCMA_ An Information Security Continuous Monitoring Program Assessment.pdf cc0d1d9 verified ethanolivertroy commited on Oct 22