Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Role-Based Access Controls (1992) [pdf] (nist.gov)
2 points by mooreds 7 months ago | past
Potential RCE via V8 Heap Corruption in Chrome (CVE-2025-5419) (nist.gov)
2 points by ghgr 7 months ago | past
CVE-2025-4143 (nist.gov)
4 points by terabytest 7 months ago | past | 1 comment
Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation (nist.gov)
1 point by furkansahin 7 months ago | past | 1 comment
NIST Special Publication 800-63: Digital Identity Guidelines Public Comments (nist.gov)
2 points by mooreds 7 months ago | past
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (2024/Aug) (nist.gov)
5 points by ColinWright 7 months ago | past
NIST on Cloning of Authentication Keys (nist.gov)
4 points by mooreds 8 months ago | past | 3 comments
New atomic fountain clock joins group that keeps the world on time (nist.gov)
118 points by austinallegro 8 months ago | past | 33 comments
NIST Privacy Framework 1.1: Initial Public Draft [pdf] (nist.gov)
4 points by CharlesW 8 months ago | past
Interoperable Randomness Beacons (nist.gov)
2 points by wslh 8 months ago | past
NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices (2023) (nist.gov)
3 points by teleforce 8 months ago | past
Reference Measurements of Error Vector Magnitude (EVM) (nist.gov)
1 point by teleforce 8 months ago | past
NIST Uncertainty Machine (nist.gov)
3 points by fanf2 8 months ago | past
File Type Spoofing Enabling Remote Code Execution in WhatsApp for Windows (nist.gov)
2 points by SpaghettiCthulu 8 months ago | past
NIST's Curved Neutron Beams Could Deliver Benefits Straight to Industry (nist.gov)
11 points by rbanffy 8 months ago | past
NIST Updates Privacy Framework, Tying It to Recent Cybersecurity Guidelines (nist.gov)
3 points by gnabgib 8 months ago | past
Unauthenticated Remote Code Execution in Erlang/OTP SSH (nist.gov)
199 points by kimi 8 months ago | past | 51 comments
React Router Hack (nist.gov)
4 points by eye_sun 9 months ago | past | 2 comments
Guidelines for Evaluating Differential Privacy Guarantees [pdf] (nist.gov)
2 points by todsacerdoti 9 months ago | past
NIST/U.S. Department of Commerce: Role-Based Access Controls (1992) [pdf] (nist.gov)
1 point by Brysonbw 9 months ago | past
Interoperable Randomness Beacons (nist.gov)
1 point by uticus 9 months ago | past
Adversarial Machine Learning: Terminology of Attacks and Mitigations [pdf] (nist.gov)
3 points by sohkamyung 9 months ago | past
NIST AI Risk Management Framework 1.0 [pdf] (nist.gov)
2 points by alexfromapex 9 months ago | past
Adversarial ML: A Taxonomy and Terminology of Attacks / Mitigations (nist.gov)
2 points by tomrod 9 months ago | past
ANSI C89 [pdf] (nist.gov)
1 point by fanf2 9 months ago | past
NIST Atomic Spectra Database Lines Form (nist.gov)
1 point by sgt 9 months ago | past
Phil Rogaway on Computer Science (nist.gov)
2 points by fanf2 9 months ago | past
Strengthening AI Agent Hijacking Evaluations (nist.gov)
43 points by StatsAreFun 10 months ago | past | 15 comments
Major leap for nuclear clock paves way for ultraprecise timekeeping (nist.gov)
2 points by fanf2 10 months ago | past | 1 comment
NIST selects HQC as fifth algorithm for post-quantum encryption (nist.gov)
164 points by gnabgib 10 months ago | past | 116 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: