Andrew R. Regenscheid
National Institute of Standards and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Andrew R. Regenscheid.
Towards Trustworthy Elections | 2010
John Kelsey; Andrew R. Regenscheid; Tal Moran; David Chaum
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Pret-a-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.
Journal of Research of the National Institute of Standards and Technology | 2015
Dustin Moody; Rene C. Peralta; Ray A. Perlner; Andrew R. Regenscheid; Allen L. Roginsky; Lidong Chen
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed.
conference on electronic voting technology workshop on trustworthy elections | 2010
Stefan Popoveniuc; John Kelsey; Andrew R. Regenscheid; Poorvi L. Vora
Archive | 2009
Elaine B. Barker; Lidong Chen; Andrew R. Regenscheid; Miles E. Smid
NIST Interagency/Internal Report (NISTIR) - 7770 | 2011
Nelson E. Hastings; Rene C. Peralta; Stefan Popoveniuc; Andrew R. Regenscheid
Special Publication (NIST SP) - 800-147 | 2011
David A. Cooper; William T. Polk; Andrew R. Regenscheid; Murugiah P. Souppaya
Special Publication (NIST SP) - 800-63B | 2017
Paul A. Grassi; Elaine M. Newton; Ray A. Perlner; Andrew R. Regenscheid; James L. Fenton; William E. Burr; Justin Richer; Naomi Lefkovitz; Jamie M. Danker; Yee-Yin Choong; Kristen Greene; Mary F. Theofanos
United States. Department of Commerce; National Institute of Standards and Technology (U.S.) | 2014
Hildegard Ferraiolo; Andrew R. Regenscheid; David A. Cooper; Salvatore Francomacaro; William E. Burr
Special Publication (NIST SP) - 800-157 | 2014
Hildegard Ferraiolo; David A. Cooper; Salvatore Francomacaro; Andrew R. Regenscheid; Jason Mohler; Sarbari Gupta; William E. Burr
OTHER - | 2018
David A. Cooper; Andrew R. Regenscheid; Murugiah P. Souppaya; Christopher Bean; Michael Boyle; Dorothy Cooley; Michael Jenkins