A simple Java command-line utility to mirror the CVE JSON data from NIST.
-
Updated
Nov 4, 2022 - Java
A simple Java command-line utility to mirror the CVE JSON data from NIST.
NIST Biometric Image Software (Java Implementation)
Core components of the Policy Machine, a NGAC reference implementation.
An open source reference card application for NIST FIPS 201-2 / NIST SP800-73-4, targeting Javacard 3.0.4+
A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKDF follows the "extract-then-expand" paradigm which is compatible to NIST 800-56C Rev. 1 two step KDF
Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create resilient digital systems with efficient responses against to cyber-threats.
A cryptographically secure pseudorandom number generator cli tool printing in a wide variety of byte encodings (hex, base64,..) and for many programming languages (c, java, c#, php, etc.) using NIST SP800-90Ar1 HMAC-DRBG. Supports external seeding from various true random services.
Preprocessing for NIST Special Dataset 19 (uppercase single-character handwritten characters A..Z). Converts to same formatting as Yann Lecun MNIST (handwritten numerical digits 0..9), and produces a set of PNG images.
Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages digest and HMAC.
Java Library for reading, writing and validating Nist files.
JAMA : A Java Matrix Package. Fork of the original project.
Uma implementação do protocolo NISTIR 8213
NIST's Meaningful Use Validator tweaked for programmatic usage
Uma implementação do protocolo NISTIR 8213
Uma implementação do protocolo NISTIR 8213 - Microserviço Interface
Library of statistical tests for randomness.
One of the important steps in certifying cryptographic algorithm is Cryptographic Algorithmic Validation Program (CAVP). NIST has enunciated a procedure for carrying out algorithmic validation as implemented for publicly known as well as non-publicly known key ciphers and their known variants. NIST has also provided for each of these algorithms …
Add a description, image, and links to the nist topic page so that developers can more easily learn about it.
To associate your repository with the nist topic, visit your repo's landing page and select "manage topics."