Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Elliptic curves
biblio
Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
time 0.0164 s
pubcrawl
public key cryptography
public key cryptosystems
Resiliency
RSA key generation
Scalability
Signature Generation
signature verification
time 0.001 s
time 0.002 s
time 0.004 s
post-quantum digital Signature algorithms
time 0.0187 s
time 0.0778 s
time 0.1378 s
time 0.2012 s
time 13.494 s
time 16.29 s
time 17.474 s
time 2.0E-4 s
verification time
W-OTS key generation
cryptographic systems security
security
bitcoin transaction security
Bitcoin transactions
classical algorithms
Comparative Analysis
Computer crime
Computers
creating digital signatures
cryptocurrencies
cryptocurrency
Cryptographic Protocols
bitcoin
Cryptography
current day algorithms
digital signatures
ECDSA key generation
Elliptic curves
encryption
Hash-based Signature Schemes
hash-based signatures
MSS Key generation
Post-quantum cryptography
biblio
Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line
Submitted by aekwall on Mon, 01/25/2021 - 12:59pm
password
High-speed
corporate network
Asymmetric Encryption
elliptic curve
Ciphers
PLC
Elliptic curves
Public key
Servers
Metrics
Cryptography
composability
pubcrawl
Human behavior
Resiliency
Protocols
encryption
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve (DCBI-IEC) for Crypto Images
Submitted by aekwall on Mon, 01/18/2021 - 11:21am
Elliptic curve cryptography
user fingerprint image
statistical analysis
Resiliency
public key cryptography
pubcrawl
key sensitivity test
image encryption application
image encryption
IEC
high security level
fingerprint minutia data
fingerprint identification
feature extraction
encryption
Elliptic curves
biometric encryption
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve
differential analysis
decryption processing
DCBI-IEC system
Chaotic maps
chaotic logistic map
chaotic cryptography
chaotic communication
chaos
biometrics (access control)
biometric identity
biometric digital identity
Metrics
Scalability
resilience
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
mobile ad hoc networks
manet privacy
secure identity-based deniable authentication protocol
identity-based cryptosystem
identity-based cryptography
IBDA protocol
heavy computational communication overhead
Deniable authentication
Bilinear Pairing
adequate security
mobile nodes
Compositionality
mobile devices
elliptic curve
mobile ad hoc network
mobile computing
Cryptography
MANET
Elliptic curves
Elliptic curve cryptography
public key cryptography
mobile radio
Ad hoc networks
message authentication
authentication
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
resilience
big data security in the cloud
special big data analytics methods
Sensitivity
sensitive information protection
secure pattern-based data sensitivity framework
patient data
healthcare data
Hadoop distributed file system
Hadoop
Elliptic curves
electronic medical records
data frequency
big data technologies
Scalability
information retrieval
Cryptography
electronic health records
Metrics
parallel processing
Data protection
Big Data
health care
Medical services
Access Control
Resiliency
pubcrawl
Distributed databases
data analysis
security
learning (artificial intelligence)
encryption
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
ECC
trusted scheme
SE-Enc
encoding scheme
asymmetric cryptography
Asymmetric Encryption
signature
Internet of Things devices
Compositionality
authenticated encryption
encoding
security requirements
encryption
Elliptic curves
Elliptic curve cryptography
Heuristic algorithms
public key cryptography
message authentication
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Internet of Things
biblio
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
elliptic curve ElGamal encryption
chaotic theory
Chosen-plaintext attack
cipher image
crossover permutation
diffusion combined chaos game
DNA sequence
EC-ElGamal
elliptic curve ElGamal cryptography
chaotic index sequence
generated scrambled image
image secure communications
key management problems
novel asymmetric image encryption method
plain-image
potential security problem
SHA-512 hash
symmetric image encryption schemes
Elliptic curves
encryption
Resiliency
Human behavior
pubcrawl
Metrics
DNA
public key cryptography
Elliptic curve cryptography
Cryptography
chaos
chaotic communication
Compositionality
chaotic system
image sequences
Asymmetric Encryption
chaos game
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
biblio
A complex number approach to elliptic curve cryptosystems over finite fields: implementations and experiments
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
prime field number-crunching
Elliptic curves
execution
field
finite element analysis
Galois fields
Metrics
network security
prime field
elliptic curve discrete alogarithm issue
pubcrawl
public key cryptography
resilience
Resiliency
Scalability
tests
twofold field math
Additives
elliptic curve cryptosystems
Elliptic curve cryptography
elliptic bend number-crunching
elliptic bend number juggling
elliptic bend math
elliptic bend cryptosystems
elliptic bend
double field
computer security
complex numbers
complex number-crunching
complex number approach
complex number
complex fields
arrange security
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »