Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
finite field
biblio
Synthesis of Discrete Complex Nonlinear Signals with Necessary Properties of Correlation Functions
Submitted by aekwall on Mon, 02/17/2020 - 1:23pm
multiuser detection
correlation functions
cryptographic signal
discrete complex nonlinear signals
discrete sequence
distributed spectrum technology
finite field
ICS applications
interference (signal)
isomorphism
correlation function
multiuser systems
nonlinear discrete cryptographic signals
nonlinear discrete sequences
pseudorandom sequences
radio spectrum management
Random sequences
signal detecting
telecommunication systems
signal processing security
Resiliency
pubcrawl
composability
Cryptography
Metrics
Correlation
privacy
channel coding
integrated circuits
telecommunication security
correlation methods
information security
wireless channels
information and communication systems
Broadband communication
radiofrequency interference
autocorrelation properties
channels code division
biblio
Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem
Submitted by grigby1 on Fri, 02/02/2018 - 12:25pm
exponentiation
Companion Matrix
composability
finite field
identification scheme
Metrics
post quantum cryptography
Primitive Polynomials
pubcrawl
quantum computing security
Resiliency
Scalability
biblio
Multivariate symmetric cryptography with 2-dimesion chaotic disturbation
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
Metrics
two-dimension chaotic system
system
Synchronization
signature system
security
Resiliency
public key cryptography
pubcrawl
multivariate symmetric encryption system
multivariate symmetric cryptography
multivariate public key cryptosystem
multivariate
minus mode
2-dimesion chaotic disturbation
Mathematical model
general attack methods
finite field
encryption
composability
chaotic shell protection
chaotic cryptography
chaotic communication
chaotic
chaos
central map
affine map
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
Radio frequency
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
matrix algebra
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
Algorithm design and analysis
key generation process
Human Factors
Human behavior
Galois fields
finite field
Ergodic Matrix
EPC code
encryption process
encryption
Databases
counterfeit
BMQE system
BMQ polynomials
bisectional multivariate quadratic equation system
anticounterfeit scheme
biblio
Research on the Underlying Method of Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
elliptic curve
Elliptic curve cryptography
Elliptic Curve Cryptosystem
Elliptic curves
finite field
Galois fields
generator
Generators
group
Metrics
pubcrawl
Receivers
Resiliency
Scalability
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)
Submitted by BrandonB on Fri, 05/01/2015 - 7:40am
Electronic mail
unbalanced functions
Transforms
optimal algebraic degree
information theory
generalized Tu-Deng functions
finite field
fast algebraic attacks
FAA
additive decomposition
Cryptography
cryptographic significant Boolean functions
combinatorial mathematics
combinatorial conjecture
Boolean functions
binary strings
algebraic immunity
Additives
biblio
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)
Submitted by BrandonB on Thu, 04/30/2015 - 11:49am
Electronic mail
unbalanced functions
Transforms
optimal algebraic degree
information theory
generalized Tu-Deng functions
finite field
fast algebraic attacks
FAA
additive decomposition
Cryptography
cryptographic significant Boolean functions
combinatorial mathematics
combinatorial conjecture
Boolean functions
binary strings
algebraic immunity
Additives