Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Elliptic curves
biblio
Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain
Submitted by aekwall on Fri, 02/25/2022 - 10:42am
blockchain
blockchains
Compositionality
Elliptic curves
Generators
Online banking
Predictive Metrics
Protocols
provable security
pubcrawl
Public key
Resiliency
Steganography
biblio
On Generation of Cycles, Chains and Graphs of Pairing-Friendly Elliptic Curves
Submitted by aekwall on Mon, 11/29/2021 - 2:29pm
Task Analysis
blockchain
Protocols
estimation
pubcrawl
composability
Compositionality
complex multiplication method
Elliptic curves
pairing-friendly elliptic curves
SNARKs
theoretical cryptography
biblio
Address Collision Attacks on ECSM Protected by ADPA
Submitted by grigby1 on Thu, 05/13/2021 - 12:20pm
Human behavior
Support vector machines
side-channel attacks
Side-channel attack
Scalability
Resiliency
resilience
pubcrawl
Power demand
Address collision attack
encryption
Elliptic curves
Elliptic curve cryptography
collision attack
Attack vectors
Analytical models
Address-bit DPA
biblio
An Implementation and Evaluation of a Pairing on Elliptic Curves with Embedding Degree 14
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
exponentiation
pseudo7-sparse algorithm
pairing-based cryptography
multiplication algorithm bases
multiple devices
generation cryptography
Finite filed arithmetic
efficient curves
computer architecture technology
advanced cryptography
Approximation algorithms
Scalability
elliptic curve
Elliptic curves
Elliptic curve cryptography
public key cryptography
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
encryption
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Protocols
zero-knowledge proof
zero trust
UTXO unconsumed model
transaction processing
smart contract address information
smart contract
self-certification
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
anonymous improvement scheme
privacy leakage
privacy
policy-based governance
Human Factors
Elliptic curves
data privacy
cryptocurrencies
contracts
blockchain atomic swap
atomic exchange
anonymous scheme
anonymous list
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
NIST
unpredictability properties
statistical testing
security strengths
secure hash function
Scalability
Resiliency
random number generation
random bit generator mechanism
Random Bit Generator
public key cryptography
pubcrawl
pseudorandom bit generators
pseudorandom bit generator mechanism
cryptographic hash functions
Metrics
Hash Function
hard number theoretic problems
Generators
encryption
Elliptic curves
elliptic curve discrete logarithm problem
Elliptic curve cryptography
Electronic mail
derivation function
decryption
cryptographic tasks
biblio
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves
Submitted by aekwall on Mon, 02/15/2021 - 4:56pm
Elliptic curve cryptography (ECC)
Weierstrass elliptic curves
side channel analysis (SCA) attacks
random order execution
point doubling operations
point addition
open-source designs
Montgomery ladder
horizontal SCA attacks
horizontal DPA attacks
hardware accelerators
fully balanced ASIC coprocessor
complete addition formulas
Scalability
application specific integrated circuits
coprocessors
Clocks
logic design
Registers
Elliptic curves
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
biblio
TMVP-Friendly Primes for Efficient Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:54pm
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
NIST
Elliptic curve cryptography
Elliptic curves
information security
Registers
Upper bound
Finite field multiplication
Montgomery curves
Toeplitz-matrix vector product
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
digital signatures
secure cloud data communication
Receivers
Quantum Key Distribution
quantum computing
public key cryptography
malicious client
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature
elliptic curve
Elliptic curve cryptography
data exchange
Cryptographic Protocols
Cloud Computing
BB84
authentication
Metrics
Resiliency
Scalability
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »