Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Role-Based Access Controls (1992) [pdf]
(
nist.gov
)
2 points
by
mooreds
7 months ago
|
past
Potential RCE via V8 Heap Corruption in Chrome (CVE-2025-5419)
(
nist.gov
)
2 points
by
ghgr
7 months ago
|
past
CVE-2025-4143
(
nist.gov
)
4 points
by
terabytest
7 months ago
|
past
|
1 comment
Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation
(
nist.gov
)
1 point
by
furkansahin
7 months ago
|
past
|
1 comment
NIST Special Publication 800-63: Digital Identity Guidelines Public Comments
(
nist.gov
)
2 points
by
mooreds
7 months ago
|
past
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (2024/Aug)
(
nist.gov
)
5 points
by
ColinWright
7 months ago
|
past
NIST on Cloning of Authentication Keys
(
nist.gov
)
4 points
by
mooreds
8 months ago
|
past
|
3 comments
New atomic fountain clock joins group that keeps the world on time
(
nist.gov
)
118 points
by
austinallegro
8 months ago
|
past
|
33 comments
NIST Privacy Framework 1.1: Initial Public Draft [pdf]
(
nist.gov
)
4 points
by
CharlesW
8 months ago
|
past
Interoperable Randomness Beacons
(
nist.gov
)
2 points
by
wslh
8 months ago
|
past
NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices (2023)
(
nist.gov
)
3 points
by
teleforce
8 months ago
|
past
Reference Measurements of Error Vector Magnitude (EVM)
(
nist.gov
)
1 point
by
teleforce
8 months ago
|
past
NIST Uncertainty Machine
(
nist.gov
)
3 points
by
fanf2
8 months ago
|
past
File Type Spoofing Enabling Remote Code Execution in WhatsApp for Windows
(
nist.gov
)
2 points
by
SpaghettiCthulu
8 months ago
|
past
NIST's Curved Neutron Beams Could Deliver Benefits Straight to Industry
(
nist.gov
)
11 points
by
rbanffy
8 months ago
|
past
NIST Updates Privacy Framework, Tying It to Recent Cybersecurity Guidelines
(
nist.gov
)
3 points
by
gnabgib
8 months ago
|
past
Unauthenticated Remote Code Execution in Erlang/OTP SSH
(
nist.gov
)
199 points
by
kimi
8 months ago
|
past
|
51 comments
React Router Hack
(
nist.gov
)
4 points
by
eye_sun
9 months ago
|
past
|
2 comments
Guidelines for Evaluating Differential Privacy Guarantees [pdf]
(
nist.gov
)
2 points
by
todsacerdoti
9 months ago
|
past
NIST/U.S. Department of Commerce: Role-Based Access Controls (1992) [pdf]
(
nist.gov
)
1 point
by
Brysonbw
9 months ago
|
past
Interoperable Randomness Beacons
(
nist.gov
)
1 point
by
uticus
9 months ago
|
past
Adversarial Machine Learning: Terminology of Attacks and Mitigations [pdf]
(
nist.gov
)
3 points
by
sohkamyung
9 months ago
|
past
NIST AI Risk Management Framework 1.0 [pdf]
(
nist.gov
)
2 points
by
alexfromapex
9 months ago
|
past
Adversarial ML: A Taxonomy and Terminology of Attacks / Mitigations
(
nist.gov
)
2 points
by
tomrod
9 months ago
|
past
ANSI C89 [pdf]
(
nist.gov
)
1 point
by
fanf2
9 months ago
|
past
NIST Atomic Spectra Database Lines Form
(
nist.gov
)
1 point
by
sgt
9 months ago
|
past
Phil Rogaway on Computer Science
(
nist.gov
)
2 points
by
fanf2
9 months ago
|
past
Strengthening AI Agent Hijacking Evaluations
(
nist.gov
)
43 points
by
StatsAreFun
10 months ago
|
past
|
15 comments
Major leap for nuclear clock paves way for ultraprecise timekeeping
(
nist.gov
)
2 points
by
fanf2
10 months ago
|
past
|
1 comment
NIST selects HQC as fifth algorithm for post-quantum encryption
(
nist.gov
)
164 points
by
gnabgib
10 months ago
|
past
|
116 comments
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: