Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Post-quantum message authentication cryptography based on error-correcting codes
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
error-correcting code based Cryptography
software implementation
Resiliency
Reed-Solomon codes
quantum computing
pubcrawl
post-quantum message authentication cryptography
Post-quantum cryptography
post-quantum code based signature
Metrics
error-correcting codes
composability
error correction codes
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
digital signatures
digital signature algorithm
digital signature
Cryptography
Computers
Computer simulation
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Practical and Secure IoT Device Authentication Using Physical Unclonable Functions
Submitted by grigby1 on Mon, 11/20/2017 - 11:28am
Internet of Things
tractable cryptographic protocols
tamper resistance solutions
Tamper resistance
secure IoT device authentication
Resiliency
resilience
PUF-based authentication protocol
public key cryptography
pubcrawl
Protocols
private key exposure
private key cryptography
practical IoT device authentication
physical unclonable functions
output mapping
authentication
input mapping
Hardware
Games
elliptic curve-based variant
Elliptic curve cryptography
discrete logarithm problem
digital signatures
digital signature generation
device enrollment
decryption
Cryptography
Cryptographic Protocols
cost-effective tamper resistance
composability
biblio
Performance Comparison Between Broadcast Authentication Methods for Vehicular Networks
Submitted by grigby1 on Fri, 08/18/2017 - 1:13pm
authentication
broadcast
digital signatures
ECDSA
pubcrawl
Resiliency
Scalability
VANETs
wireless
biblio
Functional Credentials for Internet of Things
Submitted by grigby1 on Fri, 08/18/2017 - 1:13pm
Applied cryptography
digital signatures
functional credentials
Internet of Things
pubcrawl
Resiliency
Scalability
biblio
Practical "Signatures with Efficient Protocols" from Simple Assumptions
Submitted by grigby1 on Fri, 08/18/2017 - 1:13pm
anonymous credentials
digital signatures
efficient privacy-enhancing protocols
group signatures
privacy
pubcrawl
Resiliency
Scalability
signature
signature with efficient protocols
simple cryptographic assumptions
biblio
Two-phase Nonrepudiation Protocols
Submitted by grigby1 on Fri, 08/18/2017 - 1:13pm
digital signature
digital signatures
nonrepudiation
pubcrawl
Resiliency
Scalability
Trusted Party
biblio
Nonrepudiation Protocols in Cloud Systems
Submitted by grigby1 on Fri, 08/18/2017 - 1:13pm
Cloud Computing
digital signature
digital signatures
nonrepudiation
pubcrawl
Resiliency
Scalability
biblio
An Efficient Intrusion Detection System Based on Adaptive Acknowledgement with Digital Signature Scheme in MANETs
Submitted by grigby1 on Wed, 08/02/2017 - 12:40pm
detection
Digital Signature Algorithm (DSA)
digital signatures
Enhanced Adaptive ACKnowledgement (EAACK)
MANET
manet attack prevention
Misbehavior Report Authentication (MRA)
pubcrawl
biblio
On the Provable Security of (EC)DSA Signatures
Submitted by grigby1 on Mon, 06/05/2017 - 11:25am
digital signatures
DSA
ECDSA
GOST
Human behavior
Metrics
provable security
pubcrawl
random key generation
Resiliency
Scalability
signature schemes
SM2
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »