Virtual Library

Our virtual library is an online repository of all of the reports, papers, and briefings that IST has produced, as well as works that have influenced our thinking.

Submit your Content

Memo

Roadmap to Potential Prohibition of Ransomware Payments

Ransomware Task Force Co-Chairs

viewpdf

Reports

Unlocking U.S. Technological Competitiveness: Evaluating Initial Solutions to Public-Private Misalignments

Ben Purser, Pavneet Singh

viewpdf

Reports

Public Private Partnerships to Combat Ransomware: An inquiry into three case studies and best practices

Elizabeth Vish, Georgeanela Flores Bustamante

viewpdf

Reports

Unlocking U.S. Technological Competitiveness: Public-Private Misalignments in Biotechnology, Energy, and Quantum Sectors

Ben Purser, Pavneet Singh

viewpdf

Reports

Effects of Electromagnetic Pulses on Communication Infrastructure: An IST Primer

viewpdf

Reports

How Does Access Impact Risk? Assessing AI Foundation Model Risk Along a Gradient of Access

Zoë Brammer, along with contributors from the AI Foundation Model Access Working Group

viewpdf

Fact Sheet

DOD and SBA Launch the Small Business Investment Company Critical Technology (SBICCT) Initiative

Strategic Balancing Initiative

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

The AES Project: Any Lessons for NC3?

Thomas Berson

SUMMARY

Tom Berson details how lessons from the Advanced Encryption Standard Competition can aid the development of international NC3 components and even be mirrored in the creation of a CATALINK community. From 1997 through 2001, the National Institute for Standards and Technology (US) (NIST) ran an open, transparent, international competition to design and select a standard block cipher called the Advanced Encryption Standard (AES). The competition proved productive, engaging, educational, surprising, and successful.

This paper is accompanied by a Fourth Leg podcast: Mathematics of Trust and Betrayal.

download pdf