Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Additives
biblio
A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
reverse engineering
testable key-controlled FSM synthesis scheme
state-transition
reverse engineering attacks
nongroup additive cellular automata
finite-state-machine synthesis
digital system
D1*CAdual
D1*CA
cellular automata guided obfuscation strategy
ip protection
IP piracy
cellular automata
security
flip-flops
Additives
finite state machines
Silicon
automata
industrial property
Logic gates
policy-based governance
composability
pubcrawl
Resiliency
biblio
A complex number approach to elliptic curve cryptosystems over finite fields: implementations and experiments
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
prime field number-crunching
Elliptic curves
execution
field
finite element analysis
Galois fields
Metrics
network security
prime field
elliptic curve discrete alogarithm issue
pubcrawl
public key cryptography
resilience
Resiliency
Scalability
tests
twofold field math
Additives
elliptic curve cryptosystems
Elliptic curve cryptography
elliptic bend number-crunching
elliptic bend number juggling
elliptic bend math
elliptic bend cryptosystems
elliptic bend
double field
computer security
complex numbers
complex number-crunching
complex number approach
complex number
complex fields
arrange security
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
On Cryptographic Properties of Some Lightweight Algorithms and its Application to the Construction of S-Boxes
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
Resiliency
MIDORI
minimal nonlinearity degree
mixing matrix
modified additive generator
nonlinear properties
optimization
output block
pubcrawl
maximal linear characteristic
S-box
S-boxes
Scalability
SKINNY
storage huge substitution tables
the degree of nonlinearity
the exponent of a matrix
upper bounds
Generators
algorithmic realization
Ciphers
CLEFIA
coordinate functions
cryptographic properties
Cryptography
encryption
exact values
Additives
index of perfection
index of strong nonlinearity
lightweight block ciphers
lightweight cipher SPECK
Lightweight Ciphers
lightweight cryptography
matrix algebra
maximal differential characteristic
biblio
Accelerated Stochastic Gradient Method for Support Vector Machines Classification with Additive Kernel
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
machine learning
Training
testing
SVM classification
support vector machines classification
Support vector machines (SVMs)
Support vector machines
Stochastic processes
Resiliency
resilience
pubcrawl
polynomials
pattern classification
Nesterov's acceleration strategy
mini-batch stochastic gradient descent
Metrics
accelerated mini-batch stochastic gradient descent algorithm
linear classifier
learning (artificial intelligence)
Kernel
gradient methods
gradient approximation
Data mining
composability
Classification algorithms
Additives
additive kernel version
additive kernel
acceleration strategy
Acceleration
accelerated stochastic gradient method
biblio
Practical Strategies for Content-Adaptive Batch Steganography and Pooled Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
Metrics
Training
testing
steganography detection
Steganography
statistical model
statistical analysis
single-image detector
pubcrawl
privacy
pooled steganalysis
Payloads
payload spreading strategy
optimal detection
omniscient Warden
Adaptation models
matched filters
matched filter
likelihood ratio test
image matching
image filtering
distortion
Detectors
content-adaptive batch steganography
content-adaptive additive embedding schemes
composability
Batch steganography
Additives
adaptive embedding
biblio
Accumulators with Applications to Anonymity-Preserving Revocation
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Human behavior
zero-knowledge proofs
user authentication
Theorem Proving
RSA-based dynamic accumulator
revocation functionality
revocation
Resiliency
resilience
public key cryptography
pubcrawl
Plugs
optimal communication complexity
Metrics
message authentication
membership revocation
accumulators
Heuristic algorithms
Cryptography
cryptographic applications
composability
Complexity theory
communication complexity
Braavos construction
authentication
ARC
anonymous revocation component
anonymous credentials
anonymous credential systems
anonymity-preserving revocation
anonymity
Additives
biblio
A privacy-preserving homomorphic encryption scheme for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
hop-by-hop encryption
smart things
sensors
secure cooperation
secret sharing
Scalability
resource constrained devices
Resiliency
pubcrawl
privacy homomorphism
Metrics
Logic gates
IoT
Internet of Things
Human Factors
Additives
Homomorphic encryption
heterogeneous smart things
fully additive secret sharing
fully additive encryption
end-to-end encryption
encryption
Elliptic curves
elliptic curve
disruptive paradigm
data concealment
data analysis module
Cryptography
context-aware decision mechanisms
ambient environment
biblio
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)
Submitted by BrandonB on Fri, 05/01/2015 - 8:40am
Electronic mail
unbalanced functions
Transforms
optimal algebraic degree
information theory
generalized Tu-Deng functions
finite field
fast algebraic attacks
FAA
additive decomposition
Cryptography
cryptographic significant Boolean functions
combinatorial mathematics
combinatorial conjecture
Boolean functions
binary strings
algebraic immunity
Additives
biblio
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)
Submitted by BrandonB on Thu, 04/30/2015 - 12:49pm
Electronic mail
unbalanced functions
Transforms
optimal algebraic degree
information theory
generalized Tu-Deng functions
finite field
fast algebraic attacks
FAA
additive decomposition
Cryptography
cryptographic significant Boolean functions
combinatorial mathematics
combinatorial conjecture
Boolean functions
binary strings
algebraic immunity
Additives
« first
‹ previous
1
2