Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
random number generation
biblio
Hash Functions are Based on Three-Dimensional Stochastic Transformations
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
stochastic methods-of-information security
input data blocks
level-of-elementary operations
memory size 4.0 Byte
output data blocks
parallel machines
pseudo-random sequence
resulting transformation
square and cube architecture
heterogeneous supercomputer technologies
stochastic protection methods
stochastic transformation
Supercomputers
three-dimensional bytes array
three-dimensional stochastic transformations
unpredictability injection
hash algorithms
Cryptography
effective protection
DOZENHASH hashing algorithm
3D stochastic transformations
Hash functions
Stochastic processes
Three-dimensional displays
Compositionality
pseudorandom number generators
statistical testing
random number generation
Generators
NIST
pubcrawl
Resiliency
information security
biblio
Quantum Services Architecture in Softwarized Infrastructures
Submitted by aekwall on Mon, 03/30/2020 - 10:41am
quantum technologies
mature development
network integration
open Interfaces.
QKD systems
quantum principles
quantum random number generators
quantum resources
Quantum services architecture
Quantum Switch
quantum switches
Madrid Quantum Network
quantum-safe methods
SDN quantum node architecture
secure bit streams
service automation
single network element
software-defined networking architectures
softwarized infrastructures
specific network cards
Telecommunication standards
quantum computing security
quantum cryptography
security
Protocols
computer architecture
software defined networking
Resiliency
pubcrawl
composability
standards
software-defined networking
quantum computing
Scalability
quality of service
random number generation
security infrastructure
Switches
Predictive Metrics
Quantum Key Distribution
current networking technology
forward key material
key exchange primitive
logically centralized SDN controller
biblio
SCR-QRNG: Side-Channel Resistant Design using Quantum Random Number Generator
Submitted by aekwall on Mon, 03/23/2020 - 12:21pm
security primitives
quantum entropy source
Quantum random number generator
radioactive decay
radioactive isotope decay
random frequency clock generator
random masking
random number generators
SCR-QRNG framework
quantum entropy chip
side-channel countermeasures
side-channel leakages
side-channel resistant design
side-channel resistant primitives
side-channel resistant QRNG
unbiased random numbers
random key generation
BSI AIS 31
Scalability
Cryptography
Resiliency
Human behavior
pubcrawl
Metrics
Entropy
random number generation
FPGA
clock frequency modulation
deterministic random bit generator
NIST SP 800-22/90B
PCB module
power side-channel attack and countermeasure
power side-channel attacks
QRNG
biblio
Semi-Finite Length Analysis for Secure Random Number Generation
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
upper bounds
random key generation
STEM
Solids
semifinite length analysis
secure random number generation
secure key generation length
lower bounds
imperfect random numbers
asymptotic expansion
Upper bound
Scalability
set theory
random number generation
Lattices
Entropy
Distribution functions
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Highly Parallel Seedless Random Number Generation from Arbitrary Thread Schedule Reconstruction
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
computerized data
random key generation
unlimited parallelism
universal concern
uniform probability outcomes
trng
threading
revenue source
reconstruction algorithm
random source
random number generator
multiprocessor
highly parallel seedless random number generation
ENT
DieHarder
data sets
Scalability
compare-and-swap operations
Blum-Elias algorithm
arbitrary thread schedule reconstruction
PRNG
Random sequences
encryption keys
private data
random number generation
probability
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Analysis of Key Randomness in Improved One-Time Pad Cryptography
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
random numbers
random key generation
true random number generator
shuffling algorithm
random keys
Psuedo Random Number Generator
perfect secrecy algorithm
Pearson correlation analysis
one-time pad cryptography
one-time pad
key randomness
key generation
Fisher-Yates shuffling algorithm
Fisher-Yates algorithm
Scalability
OTP
Ciphers
correlation methods
Mice
random number generation
Generators
Prediction algorithms
Metrics
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
biblio
Analysis of the Noise Source Entropy Used in OpenSSL’s Random Number Generation Mechanism
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
operating systems
random key generation
Unix-like operating systems
TCP-IP layer
security protocol
secure socket layer
real-time clock
OpenSSL random number generation
open source library
noise source entropy
Noise
devrandom
cryptographic random numbers
cryptographic key generation
IP networks
OpenSSL
random number generation
Unix
public domain software
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
transport protocols
Cryptography
Scalability
biblio
A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
key generation
random key generation
session key generation
repeated random numbers
randomized numbers
random sequence
pseudorandom number generator algorithm
Pseudo-Random Numbers
PRNG seed
PRNG
NIST Test Suite
Linear Congruential Generator algorithm
Linear Congruential Generator
LCG algorithm
Scalability
entropy source epoch timestamp
Random sequences
Authentication schemes
cryptographic algorithm
random number generation
Entropy
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:41am
Random walks
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
pubcrawl
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
Cryptography
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
automated driving systems
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
biblio
Scalable Distributed Random Number Generation Based on Homomorphic Encryption
Submitted by aekwall on Mon, 03/16/2020 - 9:40am
Metrics
verifiable random functions
verifiable random function
scalable verification
scalable distributed random number generation
Scalability
Resiliency
random number generation
random key generation
random beacons
publicly-verifiable randomness
public key cryptography
pubcrawl
Predictive Metrics
blockchain based applications
mathematical operations
Human behavior
Homomorphic encryption
encrypted data
elliptic curve multiplications
Elliptic curve cryptography
distributed network
distributed ledgers
decentralized schemes
Cryptographic Protocols
Compositionality
blockchain context
« first
‹ previous
1
2
3
4
5
next ›
last »