Commit History

Add NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives.pdf
6f42fd0
verified

ethanolivertroy commited on

Add Forensics Web Services (FWS).pdf
afdcc09
verified

ethanolivertroy commited on

Add CMVP Approved Authentication Mechanisms_ CMVP Validation Authority Requirements for ISO_IEC 19790 Annex E and ISO_IEC 24579 Section 6.17.pdf
97223fc
verified

ethanolivertroy commited on

Add PIV Card to Reader Interoperability Guidelines.pdf
46a38bc
verified

ethanolivertroy commited on

Add Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171.pdf
40d417e
verified

ethanolivertroy commited on

Add Symmetric Key Injection onto Smart Cards.pdf
80c1bba
verified

ethanolivertroy commited on

Add Security Guidelines for Storage Infrastructure.pdf
f06f4e7
verified

ethanolivertroy commited on

Add Blockchain Networks_ Token Design and Management Overview.pdf
d387493
verified

ethanolivertroy commited on

Add NIST Workshop on the Requirements for an Accordion Cipher Mode 2024_ Workshop Report.pdf
6cba45f
verified

ethanolivertroy commited on

Add Recommendation for Block Cipher Modes of Operation_ the CMAC Mode for Authentication.pdf
dc923f5
verified

ethanolivertroy commited on

Add Requirements for Cryptographic Accordions.pdf
311082c
verified

ethanolivertroy commited on

Add CMVP Documentation Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759.pdf
fddb793
verified

ethanolivertroy commited on

Add Recommendation for Block Cipher Modes of Operation_ Galois_Counter Mode (GCM) and GMAC.pdf
35afcda
verified

ethanolivertroy commited on

Add Workforce Framework for Cybersecurity (NICE Framework).pdf
0d5e1cc
verified

ethanolivertroy commited on

Add Secure Virtual Network Configuration for Virtual Machine (VM) Protection.pdf
8de85e2
verified

ethanolivertroy commited on

Add A Survey of Remote Monitoring.pdf
13f39aa
verified

ethanolivertroy commited on

Add Benefits of an Updated Mapping between the NIST Cybersecurity Framework and the NERC Critical Infrastructure Protection Standards.pdf
c89699a
verified

ethanolivertroy commited on

Add Stateless Hash-Based Digital Signature Standard.pdf
6a15c42
verified

ethanolivertroy commited on

Add Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide_ Volume 2 – Process-based Manufacturing System Use Case.pdf
b0134b6
verified

ethanolivertroy commited on

Add Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography.pdf
fc56d17
verified

ethanolivertroy commited on

Add Computer Security_ Selected Articles.pdf
23d29f3
verified

ethanolivertroy commited on

Add Notional Supply Chain Risk Management Practices for Federal Information Systems.pdf
f38e104
verified

ethanolivertroy commited on

Add Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products.pdf
6468e83
verified

ethanolivertroy commited on

Add PBX Administrator’s Security Standards.pdf
1221630
verified

ethanolivertroy commited on

Add 2020 Cybersecurity and Privacy Annual Report.pdf
cb9f064
verified

ethanolivertroy commited on

Add Cryptographic Module Validation Program (CMVP)-Approved Sensitive Security Parameter Generation and Establishment Methods_ CMVP Validation Authority U.pdf
c64fb6a
verified

ethanolivertroy commited on

Add Personal Identity Verification (PIV) of Federal Employees and Contractors.pdf
d1f238e
verified

ethanolivertroy commited on

Add Data Confidentiality_ Detect, Respond to, and Recover from Data Breaches.pdf
a1a11eb
verified

ethanolivertroy commited on

Add National Online Informative References (OLIR) Program_ Overview, Benefits, and Use.pdf
3588ac3
verified

ethanolivertroy commited on

Add IoT Device Cybersecurity Guidance for the Federal Government_ Establishing IoT Device Cybersecurity Requirements.pdf
1a6ce01
verified

ethanolivertroy commited on

Add Methodology for Characterizing Network Behavior of Internet of Things Devices.pdf
d3bfd83
verified

ethanolivertroy commited on

Add Vulnerabilities in Quantum Key Distribution Protocols.pdf
2877cc6
verified

ethanolivertroy commited on

Add A Review of U.S. and European Security Evaluation Criteria.pdf
09de0cf
verified

ethanolivertroy commited on

Add Foundational PNT Profile_ Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services.pdf
e943814
verified

ethanolivertroy commited on

Add Building a Cybersecurity and Privacy Learning Program.pdf
77e5266
verified

ethanolivertroy commited on

Add Data Confidentiality_ Identifying and Protecting Assets Against Data Breaches.pdf
680469d
verified

ethanolivertroy commited on

Add 5th Annual PKI R&D Workshop _Making PKI Easy to Use_ Proceedings.pdf
0a320af
verified

ethanolivertroy commited on

Add Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure.pdf
b741587
verified

ethanolivertroy commited on

Add COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0.pdf
4ebb140
verified

ethanolivertroy commited on

Add Ordered t-way Combinations for Testing State-based Systems.pdf
d26174f
verified

ethanolivertroy commited on

Add Computer Security Division 2012 Annual Report.pdf
8a262c9
verified

ethanolivertroy commited on

Add Assessing Security Requirements for Controlled Unclassified Information.pdf
ed10cb9
verified

ethanolivertroy commited on

Add Secure Hash Standard (SHS).pdf
183e2f9
verified

ethanolivertroy commited on

Add The Common Configuration Scoring System (CCSS)_ Metrics for Software Security Configuration Vulnerabilities.pdf
1af960c
verified

ethanolivertroy commited on

Add Guide to Bluetooth Security.pdf
c478032
verified

ethanolivertroy commited on

Add Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series.pdf
3eb7a35
verified

ethanolivertroy commited on

Add Control Baselines for Information Systems and Organizations.pdf
d3dc346
verified

ethanolivertroy commited on

Add Recommendation for Block Cipher Modes of Operation_ Three Variants of Ciphertext Stealing for CBC Mode.pdf
27e9dbd
verified

ethanolivertroy commited on

Add The Common Misuse Scoring System (CMSS)_ Metrics for Software Feature Misuse Vulnerabilities.pdf
60276e1
verified

ethanolivertroy commited on

Add ISCMA_ An Information Security Continuous Monitoring Program Assessment.pdf
cc0d1d9
verified

ethanolivertroy commited on