Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
Complexity theory
one-time code-based digital signature scheme
key recovery attack
information set decoding
code-based cryptography
attack complexity
cryptanalysis
Hamming weight
Secret key
Scalability
statistical analysis
public key cryptography
digital signatures
Decoding
Cryptography
pubcrawl
Resiliency
biblio
Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
ECC
State Cryptography Administration
SM2 signature generation schemes
SM2 digital signature generation
SM2
secure cloud cryptography computing
secret sharing based cryptography
key exchange schemes
elliptic curve public key cryptography algorithm
additively homomorphic encryption
China
secret sharing
Homomorphic encryption
Cloud Computing
Elliptic curves
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
Software
data encryption
encryption
digital signature
Scalability
biblio
ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
cloud
ROM
produced signature
issued signature
Intenet of Things
ID-based strong designated verifier signature scheme
ID-based signature scheme
Electrical Engineering
Designated verifier signature
designated verifier
BDH
random oracle model
Cloud Computing
sensors
Bilinear Pairing
Smart Home
Public key
digital signatures
pubcrawl
Resiliency
provable security
Internet of Things
digital signature
Scalability
biblio
Code-Based Schemes for Post-Quantum Digital Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Complexity theory
quantum security
post-quantum digital signatures
electronic digital signature
code-based schemes
code-based cryptography
CFS scheme
quantum computing
Post-quantum cryptography
Scalability
quantum cryptography
public key cryptography
Public key
digital signatures
Decoding
pubcrawl
Resiliency
digital signature
biblio
A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
bilinear pairings
strong designated verifier
signer ambiguity
signature length
random oracle model
public key system
nontransferability
group-oriented strong designated verifier signature scheme
group-oriented
GO-SDVS scheme
constant-size signatures
constant-size
Scalability
adaptive chosen-message attacks
Oceans
computer science
handwriting recognition
public key cryptography
Public key
digital signatures
Generators
pubcrawl
Resiliency
digital signature
biblio
Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Bitcoin cryptocurrency
Winternitz one-time signature scheme
stateful hash-based signature schemes
stateful hash-based digital signature schemes
signature verification
Signature Generation
Rivest Shamir Adleman
Post-quantum cryptography
Merkle signature scheme
Lamport one-time signature scheme
Hash-based Digital Signature
elliptic curve digital signature algorithm
discrete logarithm problems
Scalability
Bitcoim
Hash Function
quantum computers
cryptocurrency
security levels
quantum cryptography
quantum computing
digital signatures
cryptocurrencies
pubcrawl
Resiliency
biblio
A Design of Digital Signature Mechanism in NDN-IP Gateway
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Internet architecture
TCP/IP technology
NDN-TCP/IP
NDN-IP gateway
NDN-IP Custom-Router Gateway
NDN-based network implementation
IP-based network
IP addresses
gateway
digital signature processing
digital signature mechanism
data naming
data authenticity
computer network security
digital signature
named data networking
NDN
internetworking
digital signatures
internet
pubcrawl
Resiliency
security
Scalability
IP networks
biblio
A New Approach of Digital Signature Verification based on BioGamal Algorithm
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Communication Network
SHA algorithm
secured digital signature algorithm
secure hash code
secure digital signature
existing PlayGamal algorithm
digital signature verification
BioGamal algorithm
encryption algorithm
sensitive information
security of data
digital signature
verification
digital signatures
Cryptography
pubcrawl
Resiliency
security
Data Security
Scalability
biblio
Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
message exchange
Service robots
service robot
security
Scalability
RSA algorithm
Resiliency
public key cryptography
Public key
pubcrawl
message transmission
message integrity
cloud
message encryption
message decryption
message authentication
intelligent robots
encryption
digital signatures
digital signature algorithm
digital signature
control engineering computing
cloud intelligent robot
Cloud Computing
biblio
Constructing a Digital Signature Algorithm Based on the Difficulty of Some Expanded Root Problems
Submitted by aekwall on Mon, 06/22/2020 - 11:24am
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
computer science
digital signature
digital signature algorithm
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »