Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Elliptic curves
biblio
A Combined Blinding-Shuffling Online Template Attacks Countermeasure Based on Randomized Domain Montgomery Multiplication
Submitted by grigby1 on Tue, 07/18/2023 - 3:22pm
security
pubcrawl
resilience
Conferences
Correlation
Scalability
side-channel attacks
Consumer electronics
Elliptic curves
Resiliency
Human Factors
exponentiation
Modular Exponent
Online Template Attack
Randomized Montgomery multiplication
Template Attack
biblio
Improvement of Final Exponentiation for a Pairing on FK12 Curve and its Implementation
Submitted by grigby1 on Tue, 07/18/2023 - 3:21pm
pubcrawl
resilience
Scalability
Cryptography
Protocols
Computers
Elliptic curves
Identity-based encryption
Resiliency
elliptic curve
Human Factors
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
biblio
Software Tool for Parallel Generation of Cryptographic Keys Based on Elliptic Curves
Submitted by grigby1 on Fri, 07/14/2023 - 3:17pm
C++ languages
Cryptography
Elliptic curve cryptography
Elliptic curves
graphics processing units
Metrics
parallel programming
pubcrawl
resilience
Resiliency
Scalability
software tool
software tools
Telecommunications
biblio
Implementation of Efficient Hybrid Encryption Technique
Submitted by grigby1 on Thu, 07/13/2023 - 12:46pm
composability
Asymmetric Encryption
efficient encryption
ECDH
symmetric encryption
Elliptic curves
ECC
Multimedia systems
Elliptic curve cryptography
encryption
Computational modeling
Protocols
authentication
AES
Resiliency
resilience
pubcrawl
biblio
Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing
Submitted by grigby1 on Tue, 11/22/2022 - 5:31pm
digital signature
Cryptography
Computational modeling
Elliptic curve cryptography
Mobile handsets
hashing
digital signatures
mobile
ECC
Elliptic curves
Scalability
proxy
PKI Trust Models
Cloud Computing
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
biblio
A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network
Submitted by grigby1 on Fri, 08/26/2022 - 11:23am
Online banking
SM2-CSA
SM2 Algorithm
Cooperative-Signature Algorithm
Teleworking
Computational efficiency
Mobility
Concurrency
Elliptic curves
digital signature
security
Mobile handsets
Complexity theory
Metrics
sensors
composability
Resiliency
resilience
pubcrawl
biblio
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities
Submitted by aekwall on Thu, 07/14/2022 - 4:15pm
Phishing
QR codes
quick response code
QR code
DSA
digital signature
codes
Elliptic curves
Mobile handsets
Cryptography
cyber-physical systems
Software algorithms
Resiliency
pubcrawl
Protocols
Software
security
biblio
Sustainability and Time Complexity Estimation of Сryptographic Algorithms Main Operations on Elliptic Curves
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
Time complexity
sustainability
Special Attacks
Order Of Elliptic Curve
Exponentiation Of Points
exponentiation
mathematical models
elliptic curve
Elliptic curves
information security
Scalability
Stability analysis
timing
resilience
Resistance
Resiliency
pubcrawl
biblio
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
pubcrawl
Resiliency
Cryptography
Elliptic curve cryptography
Resistance
resilience
Scalability
Poles and towers
Elliptic curves
Identity-based encryption
Costs
elliptic curve
exponentiation
pairing-based cryptography
special TNFS
biblio
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
pubcrawl
Resiliency
authentication
Cryptography
Protocols
Elliptic curve cryptography
resilience
Scalability
Elliptic curves
Identity-based encryption
elliptic curve
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
1
2
3
4
5
6
7
8
next ›
last »