Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ECDSA
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Backchanneling Quantum Bit (Qubit) 'Shuffling': Quantum Bit (Qubit) 'Shuffling' as Added Security by Slipstreaming Q-Morse
Submitted by grigby1 on Fri, 11/03/2017 - 10:33am
random radicals
predicted-expected sender-receiver properties
pubcrawl
public key cryptography
Quantum bit (Qubit)
quantum computing
quantum cryptography
quantum cyphers
Quantum entanglement
Morse
Resiliency
Rivest-Shamir-Adleman
RSA
Scalability
sensors
Shuffling
slipstreaming Q-Morse code
containment wave
backchanneling qubit shuffling
Backchannelling
backchannelling quantum Morse code
blockchain ledger history
blockchain security
Ciphers
codes
communication security
backchanneling quantum bit shuffling
Cypher
digital signature algorithm
DSA
ECDSA
elliptic curve digital signature algorithm
Entanglement
Internet of Things
biblio
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes
Submitted by grigby1 on Tue, 08/22/2017 - 10:54am
Deterministic Signatures
ECDSA
Elliptic curve cryptography
Human behavior
pervasive computing
pubcrawl
Resiliency
Scalability
side-channel attacks
biblio
Performance Comparison Between Broadcast Authentication Methods for Vehicular Networks
Submitted by grigby1 on Fri, 08/18/2017 - 1:13pm
authentication
broadcast
digital signatures
ECDSA
pubcrawl
Resiliency
Scalability
VANETs
wireless
biblio
On the Provable Security of (EC)DSA Signatures
Submitted by grigby1 on Mon, 06/05/2017 - 11:25am
digital signatures
DSA
ECDSA
GOST
Human behavior
Metrics
provable security
pubcrawl
random key generation
Resiliency
Scalability
signature schemes
SM2
biblio
Attacking OpenSSL Implementation of ECDSA with a Few Signatures
Submitted by grigby1 on Wed, 05/17/2017 - 12:49pm
collaboration
composability
cryptology
digital signatures
ECDSA
extended hidden number problem
f lush+r eload attack
Human behavior
lattice attack
Metrics
OpenSSL
pubcrawl
Resiliency
Scalability
windowed non-adjacent form
biblio
A decentralized approach for security and privacy challenges in the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 10:06am
Information Leakage
wireless technologies
user privacy
sensitive data management
security challenges
security
public key cryptography
privacy
personal area networks
lightweight token
IoT stakeholders
IoT deployment
Internet of Things
internet
6LoWPAN
elliptic curve digital signature algorithm
ECDSA
distributed capability-based access control mechanism
distributed access control
digital signatures
data privacy
Cryptography
cryptographic primitives
computer network security
CoAP resources
authorization
authorisation
authentication
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 9:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 12:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
« first
‹ previous
1
2