Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
The Ideal Block Ciphers - Correlation of AES and PRESENT in Cryptography
Submitted by grigby1 on Wed, 08/18/2021 - 10:15am
PRESENT block cipher
Ultra-light weight
timing
sensors
Scalability
Resiliency
resilience
Registers
pubcrawl
AES cipher
Lightweight Ciphers
IoT
Hardware
encryption
Cryptography
Conferences
Ciphers
Area
biblio
Lightweight Security Data Streaming, Based on Reconfigurable Logic, for FPGA Platform
Submitted by grigby1 on Wed, 08/18/2021 - 10:14am
Ciphers
Clocks
Cryptography
cyber security
field programmable gate arrays
FPGA
Hardware Security
Lightweight
Lightweight Ciphers
pubcrawl
Reconfigurable Logic
Registers
resilience
Resiliency
Scalability
stream ciphers
biblio
Implementation and Cryptanalysis of Lightweight Block Ciphers
Submitted by grigby1 on Wed, 08/18/2021 - 10:14am
Pearson correlation
SPN
Scalability
S-box
Resiliency
resilience
pubcrawl
PRESENT Cipher
Power demand
Add-round key
Monitoring
MATLAB
Lightweight Ciphers
Hamming weight calculation
Hamming weight
Correlation
Ciphers
biblio
A Lightweight VLSI Architecture for RECTANGLE Cipher and its Implementation on an FPGA
Submitted by grigby1 on Wed, 08/18/2021 - 10:13am
lightweight cryptography
VLSI architecture
Schedules
Scalability
Resiliency
resilience
Registers
RECTANGLE
pubcrawl
block ciphers
Lightweight Ciphers
FPGA
field programmable gate arrays
encryption
computer architecture
Clocks
Ciphers
biblio
PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers
Submitted by grigby1 on Wed, 08/18/2021 - 10:12am
authentication
Ciphers
cryptographic hardware architecture
field programmable gate arrays
Hardware
lightweight block ciphers
Lightweight Ciphers
memory security
message authentication code
Partitioning algorithms
pubcrawl
resilience
Resiliency
Scalability
biblio
A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design
Submitted by aekwall on Tue, 08/17/2021 - 3:15pm
key establishment
styling
style
Scalability
Resiliency
pubcrawl
Protocols
Metrics
Key Management Architecture
key management
authentication
insert (key words) DTN
Human behavior
Heuristic algorithms
framework
formatting
computer architecture
component
Ciphers
biblio
Cloud Cryptography: User End Encryption
Submitted by grigby1 on Thu, 07/08/2021 - 1:36pm
Google
user privacy in the cloud
user privacy
Scalability
Resiliency
resilience
pubcrawl
Metrics
key generation
Business
encryption
decryption
Cryptography
cloud computing security
Cloud Computing
cloud
Ciphers
biblio
Algebraic Cryptanalysis of O'zDSt 1105:2009 Encryption Algorithm
Submitted by grigby1 on Tue, 05/25/2021 - 2:26pm
Human Factors
Task Analysis
standards
Scalability
Resilient
resilience
pubcrawl
O'zDSt 1105:2009
Metrics
information science
Algebraic cryptanalysis
Human behavior
encryption
diamatrix
decomposition
cryptology
composability
Communications technology
collaboration
Ciphers
biblio
A HES for Low Speed Processors
Submitted by grigby1 on Thu, 05/20/2021 - 10:55am
Program processors
white box cryptography
HES
DES
decryption
security services
Robustness
Task Analysis
Memory management
Ciphers
composability
standards
security mechanisms
Resiliency
resilience
Metrics
pubcrawl
encryption
biblio
Fixed Point Attack on Lin et al.’s Modified Hash Function Scheme based on SMALLPRESENT-[8] Algorithm
Submitted by aekwall on Mon, 03/29/2021 - 11:07am
Hash functions
SMALLPRESENT-[8] algorithm
SMALLPRESENT-[8]
mac
Lin et al.’s scheme
Lin et al.’s modified scheme
hash function message authentication codes block cipher based scheme
fixed point messages discovery
fixed point attack
Compression function
hash algorithms
Cryptography
scheduling
Transforms
Compositionality
Ciphers
pubcrawl
message authentication
authentication
Resiliency
Classification algorithms
encryption
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »