Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andrew R. Regenscheid is active.

Publication


Featured researches published by Andrew R. Regenscheid.


Towards Trustworthy Elections | 2010

Attacking paper-based e2e voting systems

John Kelsey; Andrew R. Regenscheid; Tal Moran; David Chaum

In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Pret-a-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.


Journal of Research of the National Institute of Standards and Technology | 2015

Report on Pairing-based Cryptography

Dustin Moody; Rene C. Peralta; Ray A. Perlner; Andrew R. Regenscheid; Allen L. Roginsky; Lidong Chen

This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed.


conference on electronic voting technology workshop on trustworthy elections | 2010

Performance requirements for end-to-end verifiable elections

Stefan Popoveniuc; John Kelsey; Andrew R. Regenscheid; Poorvi L. Vora


Archive | 2009

SP 800-56B. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography

Elaine B. Barker; Lidong Chen; Andrew R. Regenscheid; Miles E. Smid


NIST Interagency/Internal Report (NISTIR) - 7770 | 2011

Security Considerations for Remote Electronic UOCAVA Voting

Nelson E. Hastings; Rene C. Peralta; Stefan Popoveniuc; Andrew R. Regenscheid


Special Publication (NIST SP) - 800-147 | 2011

BIOS Protection Guidelines

David A. Cooper; William T. Polk; Andrew R. Regenscheid; Murugiah P. Souppaya


Special Publication (NIST SP) - 800-63B | 2017

Digital Identity Guidelines: Authentication and Lifecycle Management

Paul A. Grassi; Elaine M. Newton; Ray A. Perlner; Andrew R. Regenscheid; James L. Fenton; William E. Burr; Justin Richer; Naomi Lefkovitz; Jamie M. Danker; Yee-Yin Choong; Kristen Greene; Mary F. Theofanos


United States. Department of Commerce; National Institute of Standards and Technology (U.S.) | 2014

Mobile, PIV, and Authentication

Hildegard Ferraiolo; Andrew R. Regenscheid; David A. Cooper; Salvatore Francomacaro; William E. Burr


Special Publication (NIST SP) - 800-157 | 2014

Guidelines for Derived Personal Identity Verification (PIV) Credentials

Hildegard Ferraiolo; David A. Cooper; Salvatore Francomacaro; Andrew R. Regenscheid; Jason Mohler; Sarbari Gupta; William E. Burr


OTHER - | 2018

Security Considerations for Code Signing

David A. Cooper; Andrew R. Regenscheid; Murugiah P. Souppaya; Christopher Bean; Michael Boyle; Dorothy Cooley; Michael Jenkins

Collaboration


Dive into the Andrew R. Regenscheid's collaboration.

Top Co-Authors

Avatar

David A. Cooper

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

William E. Burr

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Hildegard Ferraiolo

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Murugiah P. Souppaya

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Ray A. Perlner

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Elaine M. Newton

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

John Kelsey

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Lidong Chen

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Mary F. Theofanos

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Paul A. Grassi

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge