Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
random number generation
biblio
True Random Number Generation in an Optical I/Q Modulator
Submitted by grigby1 on Tue, 08/31/2021 - 12:08pm
Elementary particle vacuum
Fluctuations
Human behavior
Metrics
optical fiber communication
optical modulation
Optical polarization
photodiodes
pubcrawl
random key generation
random number generation
resilience
Resiliency
Scalability
biblio
Hardware Implementation of a Cryptographically Secure Pseudo-Random Number Generators Based on Koblitz Elliptic Curves
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
Scalability
Resiliency
pubcrawl
public key cryptography
random number generation
exponentiation
3-stage pipelined multiplier
clock cycles
cryptographically secure pseudo-random number generator (CPRNG)
cryptographically secure pseudorandom number generator
field-programmable gate array (FPGA)
Koblitz curves
NIST Koblitz elliptic curve K-163
biblio
Stable cryptographic key generation using SRAM based Physical Unclonable Function
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
SRAM fingerprint
random pattern
resilience
Resiliency
Scalability
secure IoT devices
SRAM
SRAM cells
SRAM chips
random number generation
SRAM physical unclonable function
SRAM PUF
Stability analysis
Static Random-Access Memory based PUFs
Threshold voltage
Transistors
Trusted Computing
zero trust
integrated circuits
Cadence Virtuoso tool
cryptographic key generation stability
cryptographic key sequence
Cryptography
digital fingerprint
fingerprint identification
hardware root-of-trust
Human Factors
authorisation
Internet of Things
IoT
MOS devices
Physical Unclonable Function
policy-based governance
power aware computing
pubcrawl
pufs
biblio
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
NIST
unpredictability properties
statistical testing
security strengths
secure hash function
Scalability
Resiliency
random number generation
random bit generator mechanism
Random Bit Generator
public key cryptography
pubcrawl
pseudorandom bit generators
pseudorandom bit generator mechanism
cryptographic hash functions
Metrics
Hash Function
hard number theoretic problems
Generators
encryption
Elliptic curves
elliptic curve discrete logarithm problem
Elliptic curve cryptography
Electronic mail
derivation function
decryption
cryptographic tasks
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
FPGA
Synchronization
synchronisation
reconfigurable hardware
reconfigurable architectures
random number sequence
random number generation
Neural networks
information security
human body
Hopfield neural networks
Hopfield neural nets
chaotic cryptography
field programmable gate arrays
encryption circuit
Dynamical Systems
dynamic systems
Cryptography
chaotic synchronization
chaotic signal simulation
chaotic communication
asymmetric cryptography method
pubcrawl
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 12:08pm
key-encryption key
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
Cache-as-RAM
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
Computers
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Internet of Things
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by aekwall on Tue, 09/08/2020 - 10:11am
chaotic communication
reconfigurable hardware
random number sequence
human body
Hopfield neural networks
Hopfield neural nets
encryption circuit
dynamic systems
chaotic synchronization
chaotic signal simulation
asymmetric cryptography method
reconfigurable architectures
chaotic cryptography
field programmable gate arrays
Predictive Metrics
Dynamical Systems
random number generation
Neural networks
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
Cryptography
FPGA
biblio
Crypto Polar Codes based on Pseudorandom Frozen Bits Values and Indices
Submitted by aekwall on Tue, 09/08/2020 - 10:06am
original encoding cipher key
decoding obscurity
discrete memoryless channel
discrete memoryless channel capacity
encoder security
generated sequences
grouping polar codes
modern communication systems
MT PRNG
one-bit change
decoding cipher key
originally sent information data bits
polarized bit channels
pseudorandom frozen bits values
secret Mersenne- Twister pseudo
secret pre-shared initial state
secured system
system secrecy
talented coding technique
error statistics
telecommunication security
Resiliency
pubcrawl
composability
Metrics
probability
channel capacity
channel coding
Decoding
Cryptography
random number generation
pseudorandom number generator
polar codes
High reliability
232-bit ciphering key
BER probability
crypto polar codes
crypto-system ciphering key
biblio
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
pseudo-random number generator (PRNG)
discrete-time chaotic maps
dynamics degradation
fixed point arithmetic
fixed-point arithmetic
floating point arithmetic
floating-point arithmetic
logistic map
Orbits
digital computer
pseudorandom number generators
Quantization (signal)
random number generation
randomness
SMN
state-mapping network
tent map
black box encryption
encryption
complex network
telecommunication security
Generators
pubcrawl
composability
Metrics
Resiliency
resilience
Cryptography
chaos
Degradation
chaotic communication
Logistics
black box
chaotic dynamics
chaotic map
communication securiy
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
1
2
3
4
5
next ›
last »