Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic algorithms
biblio
Database Encryption Using Asymmetric Keys: A Case Study
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
encryption
web applications
test database
RSA
Resiliency
resilience
pubcrawl
padding
Metrics
Java API
Java
internet
Human behavior
encryption-decryption keys
encryption keys
encryption algorithms
application performance decrease
Encrypted database
ElGamal
ECIES
Distributed databases
Databases
database encryption
Data Security
Cryptography
cryptographic algorithms
Compositionality
Benchmark testing
asymmetric keys
Asymmetric Encryption
application program interfaces
biblio
Mixed chaotic maps based encryption for high crypto secrecy
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Logistics
Transposition
Substitution
statistical analysis
standards
simple chaotic maps
secure image encryption techniques
secure image encryption
Resiliency
pubcrawl
mixed chaotic maps
Metrics
chaos
initial conditions
Image Processing
high crypto secrecy
encryption
Elliptic curve cryptography
Cryptography
cryptographic algorithms
composability
chaotic cryptography
chaotic communication
chaos based image encryption technique
biblio
"Bit-Level Differential Power Analysis Attack on Implementations of Advanced Encryption Standard Software Running Inside a PIC18F2420 Microcontroller"
Submitted by grigby1 on Thu, 02/23/2017 - 12:52pm
Mathematical model
side channel attacks
pubcrawl170105
Power measurement
Power demand
Power Attacks
PIC18F2420 microcontroller
microcontrollers
microcontroller security
microcontroller privacy
microcontroller
advanced encryption standard software
encryption
Differential Power Analysis
Data protection
data integrity
data confidentiality
Cryptography
cryptographic algorithms
bit-level differential power analysis attack
AES
biblio
"Side channel power analysis of an AES-256 bootloader"
Submitted by grigby1 on Tue, 02/14/2017 - 12:57pm
Hamming weight
Synchronization
side channel power analysis
side channel attacks
secure bootloader
SCA
pubcrawl170102
power measurements
Power measurement
microcontrollers
initialization vector
AES-256 bootloader
firmware files
Entropy
encryption
Cryptography
cryptographic algorithms
CPA attack
correlation power analysis
Correlation
AES-256-CBC
biblio
COALA - System for Visual Representation of Cryptography Algorithms
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
RSA algorithm
Diffie-Hellman
Diffie-Hellman algorithm
educational courses
Educational institutions
educational software systems
engineering sciences
further education
RSA
DES algorithm
School of Electrical Engineering
security education
Software algorithms
student attitudes
student knowledge acquisition
University of Belgrade
visualization
AES
DES
Data visualization
data visualisation
data security course
Data Security
cryptography algorithms
Cryptography
cryptographic algorithms
cryptographic algorithm visual representation
computer science education
computer aided instruction
COALA system
algorithm visualization
Algorithm design and analysis
AES algorithm
biblio
A new tool for lightweight encryption on android
Submitted by BrandonB on Mon, 05/04/2015 - 1:07pm
information security risk
Throughput
SUN JCE cryptographic provider
stream ciphers
standards
smart phones
PBKDF2 password based key generation method
PBKDF2
password based authentication
NCRYPT application
mobile device
lightweight encryption scheme
Lightweight Encryption
JNI
Java native interface
AES encryption scheme
information security
HummingBird2
Hummingbird-2 scheme
encryption
DES encryption scheme
Cryptography
cryptographic key
cryptographic algorithms
confidential data
Ciphers
C language
block ciphers
Android platform
android
« first
‹ previous
1
2