Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ECDSA
biblio
Versatile Hardware Framework for Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 07/14/2023 - 2:19pm
Resistance
Side channel hardening
eddsa
Galois fields
Electronic countermeasures
ECDSA
ECDH
public key cryptography
timing
pubcrawl
Elliptic curve cryptography
Scalability
Hardware
FPGA
field programmable gate arrays
Resiliency
resilience
Metrics
biblio
Empirical Study of Standard Elliptic Curve Domain Parameters for IoT Devices
Submitted by grigby1 on Thu, 05/05/2022 - 1:18pm
Metrics
Time measurement
SECP256K1
secp192k1
Scalability
Resiliency
resilience
pubcrawl
privacy
performance evaluation
asymmetric key cryptography
Memory management
Industries
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDH
ECC
composability
biblio
Design and Execution of Highly Adaptable Elliptic Curve Cryptographic Processor and Algorithm on FPGA using Verilog HDL
Submitted by grigby1 on Thu, 05/05/2022 - 1:18pm
Metrics
Verilog
Time-frequency Analysis
Scalability
Resiliency
resilience
Registers
pubcrawl
process control
composability
Memory management
Layout
Karatsuba
FPGA
Elliptic curves
Elliptic curve cryptography
elliptic curve
ECDSA
biblio
Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm
Submitted by grigby1 on Tue, 02/22/2022 - 12:25pm
Metrics
Stakeholders
signature
Scalability
RSA
Resiliency
resilience
pubcrawl
privacy
peer-to-peer security
Peer-to-peer computing
peer to peer security
IoTBC
Internet of Things
Intelligent systems
Human Factors
Hash Function
Elliptic curve cryptography
ECDSA
ECC
digital
blockchain
biblio
Establishing Authenticity for DICOM images using ECC algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
medical image processing
telemedicine
tampered data
signature verification
security
Scalability
Resiliency
resilience
pubcrawl
privacy
patient records
MRI brain images
Metrics
Medical services
medical related image files
medical information systems
authenticity
medical image files
Medical diagnostic imaging
magnetic resonance imaging
image watermarking
Human behavior
Electronic Medical Records (EMR)
ECDSA algorithm
ECDSA
ECC algorithm
digital signatures
DICOM images
DICOM
data privacy
BIOS
biomedical MRI
biblio
Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Consumer electronics
Web-interface
software tools
secure key storage
institution electronic document circulation
GOST RF Standard 34.10–2018
electronic document circulation
electronic digital signature generation
documented information exchanging
cryptographic module
central Web-server
blockchain storage of electronic signatures
blockchain storage
ECDSA
Scalability
electronic digital signature
DSA
document handling
RSA
Information systems
digital signatures
software development
software engineering
blockchain
pubcrawl
Resiliency
Software
Cryptography
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
fuzzy set theory
Fuzzy Cryptography
symmetric cryptographic algorithms
suitable cryptographic algorithm
SHA256
fuzzy analytic hierarchy process
FAHP
experts grading method
ECDSA
asymmetric cryptographic algorithms
financial data processing
AES
cryptographic algorithms
security
cryptocurrencies
analytic hierarchy process
Distributed databases
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Hardware
data privacy
Computational efficiency
Scalability
biblio
A New Approach to Security of N TP via SSL Certificates
Submitted by grigby1 on Mon, 02/10/2020 - 10:30am
ECDSA
Human behavior
Human Factors
Metrics
mtim
NTP
ntp protocol attacks
pubcrawl
resilience
Resiliency
RSA
Scalability
SSL
SSL Trust Models
biblio
Prominence Of ECDSA Over RSA Digital Signature Algorithm
Submitted by grigby1 on Tue, 10/15/2019 - 1:44pm
Human behavior
RSA Digital Signature Algorithm
RSA
Resiliency
resilience
Repudiation
public key cryptography
public key cryptographic algorithms
pubcrawl
non-repudiation
Metrics
composability
handwriting recognition
Elliptical Curve Digital Signature Algorithm
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDLP
ECC
digital signatures
cryptosystem
Conferences
biblio
A review on VANET security attacks and their countermeasure
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Resiliency
world VANET
Wireless communication
vehicular ad hoc networks
VANETs wireless communication
VANETs architecture
VANETs
VANET technology
VANET security attacks
V2Vcommunication
telecommunication security
smart cities
security issues
security
Roads
attacks
resilience
pubcrawl
privacy properties
privacy
mobile computing
Metrics
MANETs
MANET
infrastructure communication
ECDSA
DSRC
Cryptography
Compositionality
authentication
1
2
next ›
last »