Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Efficient modular multiplication algorithms for public key cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:07am
modular exponentiation
word length
substitute and reward algorithms
store and forward algorithms
RSA
public key cryptosystems
Public key cryptography(PKC)
public key cryptography
modular multiplication algorithms
Modular Multiplication
Algorithm design and analysis
encryption
digital signatures
digital signature schemes
cryptographic transformations
Conferences
Ciphers
bit forwarding algorithms
binary exponentiation
BFW algorithms
biblio
An architectural framework for encryption amp; generation of digital signature using DNA cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:05am
DNA computing DNA cryptography
Steganography
plaintext size
key size
information security
encryption time
encryption algorithms
encryption
encoding
DNA digital coding
DNA cryptography
architectural framework
DNA computing
DNA
digital signatures
digital signature generation
digital signature encryption
decryption time
cryptanalysis
Ciphers
biocomputing
biblio
Asymmetrical quantum encryption protocol based on quantum search algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
quantum cryptography
unitary operations
trapdoor one-way functions
symmetrical quantum key distribution
single photon measurement
secret messages
search quantum algorithm
search problems
quantum search algorithms
quantum search algorithm
Quantum mechanics
quantum information science
asymmetrical encryption
private-information
no-cloning theorem
key-generation randomized logarithm
information-theoretical security
Elliptic curve cryptography
Cryptography
Cryptographic Protocols
Ciphertext
Ciphers
asymmetrical quantum encryption protocol
biblio
Cryptographic key generator candidates based on smartphone built-in sensors
Submitted by BrandonB on Mon, 05/04/2015 - 12:35pm
Android (operating system)
Android-based smartphones
Ciphers
cryptographic key generator candidates
cryptographic system
Cryptography
encryption
Generators
random number generation
random number generators
Random sequences
RNG
sensors
smart phones
smartphone
smartphone built-in sensors
biblio
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Submitted by BrandonB on Mon, 05/04/2015 - 12:09pm
SDKEY-based transparent encryption storage
PIN
prototype system
public key cryptography
public key exchange
Receivers
SDKEY
SDKEY device
SDKEY-based secure storage
message authentication
secure computation environment
sensitive data leakage
smart phones
storage management
system boot
transmission approach
zero-key exchange
encryption
Android phones
Android system
authentication
Ciphers
data files
Data protection
decryption operation
dual-authentication scheme
Android (operating system)
encryption operation
Encryption Storage
encryption transmission
fine-grained encryption scheme
Key exchange
key exchange mechanisms
lock screen
biblio
A new tool for lightweight encryption on android
Submitted by BrandonB on Mon, 05/04/2015 - 12:07pm
information security risk
Throughput
SUN JCE cryptographic provider
stream ciphers
standards
smart phones
PBKDF2 password based key generation method
PBKDF2
password based authentication
NCRYPT application
mobile device
lightweight encryption scheme
Lightweight Encryption
JNI
Java native interface
AES encryption scheme
information security
HummingBird2
Hummingbird-2 scheme
encryption
DES encryption scheme
Cryptography
cryptographic key
cryptographic algorithms
confidential data
Ciphers
C language
block ciphers
Android platform
android
biblio
Error value driven fault analysis attack
Submitted by BrandonB on Fri, 05/01/2015 - 6:56am
advanced encryption standard
AES
Ciphers
Circuit faults
cryptographic circuits
Cryptography
encryption
Equations
Error value
error value driven fault analysis attack method
Fault analysis attacks
field programmable gate arrays
Side-channel attack
standards
Tamper resistance
biblio
Cryptographically secure shields
Submitted by BrandonB on Thu, 04/30/2015 - 1:20pm
metal layer
TSV technology
Through Silicon Vias (TSV)
through silicon vias
three-dimensional integrated circuits
SIMON lightweight block cipher
SIMON block cipher
shield structure
security product
Routing
Registers
protective layer
probing attacks
Metals
chip design
mesh lines
invasive attacks
integrated circuits
integrated circuit design
integrated circuit
Focused Ion Beam (FIB)
digital shield
digital fence
Cryptography
Cryptographically secure shield
cryptographical secure shield
Ciphers
« first
‹ previous
…
10
11
12
13
14
15
16
17
18