Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Registers
biblio
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture
Submitted by aekwall on Mon, 05/03/2021 - 1:06pm
return oriented programming
Algorithms
composability
computer architecture
Human Factors
Instruction sets
Payloads
pubcrawl
Registers
Resiliency
rop attacks
Scalability
Task Analysis
Windows
biblio
A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
exponentiation
semiinterleaved ladders
RSA cryptographic protocol
iterative conditional branching
interleaved variables
fully-interleaved ladders
fully-interleaved ladder properties
fully-interleaved cases
Countermeasures (computer)
Iterative algorithms
Montgomery ladder
interleaved codes
fault detection
Scalability
public-key cryptography
modular exponentiation
side-channel attacks
Registers
Space exploration
public key cryptography
Mathematical model
pubcrawl
Resiliency
Cryptographic Protocols
security
Cryptography
biblio
Simulation of Modular Exponentiation Circuit for Shor's Algorithm in Qiskit
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
4-bit VBE quantum modular exponentiation circuit
x mod 15 circuit
step-by-step manner
Shor's Algorithm incorporating
RSA cryptosystems
quantum modular exponentiation circuit
quantum gates
Qiskit simulator
Qiskit
large-qubit quantum computer
integer factorization problem
example simulation
Ekert proposal
aforementioned circuit
Scalability
Quantum circuit
exponentiation
Qubit
adders
Registers
Integrated circuit modeling
Logic gates
quantum computing
public key cryptography
Computational modeling
pubcrawl
Resiliency
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
biblio
An effective technique preventing differential cryptanalysis attack
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
Adaptive scan chain
Chained Attacks
traditional scan chain
plaintexts differs
plaintext analysis technique
plaintext analysis module
plaintext analysis circuit
differential cryptanalysis attack
different scan chain
design for testability
controller circuit
complicated scan chain
adaptive scan chain structure
adaptive scan chain circuit
Logic gates
Hardware Security
Watermarking
Switches
Registers
Scalability
integrated circuit testing
Mathematical model
AES
Hardware
Resiliency
resilience
pubcrawl
Cryptography
biblio
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves
Submitted by aekwall on Mon, 02/15/2021 - 4:56pm
Elliptic curve cryptography (ECC)
Weierstrass elliptic curves
side channel analysis (SCA) attacks
random order execution
point doubling operations
point addition
open-source designs
Montgomery ladder
horizontal SCA attacks
horizontal DPA attacks
hardware accelerators
fully balanced ASIC coprocessor
complete addition formulas
Scalability
application specific integrated circuits
coprocessors
Clocks
logic design
Registers
Elliptic curves
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
biblio
Highly Area-Efficient Implementation of Modular Multiplication for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
koblitz Curve
Virtex-7 FPGA technology
Throughput
Table lookup
Scalability
Resiliency
Registers
public-key cryptosystem
Public Key Cryptography (PKC)
public key cryptography
pubcrawl
multiplying circuits
Metrics
LUT-FF pairs
logic design
256-bit modified interleaved modular multiplication
Interleaved Modular Multiplication (IMM)
IMM
hardware implementation design
Hardware Architecture (HA)
Hardware
flip-flops
field programmable gate arrays
Field Programmable Gate Array (FPGA)
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC operation
Cryptography
cryptographic operation
computer architecture
biblio
TMVP-Friendly Primes for Efficient Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:54pm
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
NIST
Elliptic curve cryptography
Elliptic curves
information security
Registers
Upper bound
Finite field multiplication
Montgomery curves
Toeplitz-matrix vector product
biblio
Quantum Homomorphic Encryption Based on Quantum Obfuscation
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
open question
telecommunication security
Scalability
Resiliency
Registers
Quantum point function
quantum obfuscation
Quantum mechanics
quantum homomorphic encryption scheme
Quantum homomorphic encryption
quantum computing security
quantum computation
public key cryptography
quantum computing
Metrics
Logic gates
Human Factors
Homomorphic encryption
encryption operator
encryption
encrypting party
encrypted data
decrypting party
data privacy
pubcrawl
security
biblio
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
reduced interflow competition
virtual machines
Virtual machine monitors
unequal share
transport protocols
telecommunication traffic
telecommunication congestion control
TCP sending rate
TCP receiver window
TCP connections
TCP congestion control
Switches
Scalability
Resiliency
resilience
Registers
bottleneck capacity
Receivers
pubcrawl
Proposals
operating systems (computers)
multitenant datacenters
minimally-invasive congestion management
Internet-wide benefits
internet
hypervisor control traffic
Hardware
guest OS
datacenter
Couplings
coupled congestion control
computer centres
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »