Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Elliptic curves
biblio
HSSM: High Speed Split Multiplier for Elliptic Curve Cryptography in IoT
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Complexity theory
Cryptography
Elliptic curve cryptography
Elliptic curves
encryption
Metrics
Montgomery Curve
pubcrawl
Random access memory
resilience
Resiliency
Scalability
Scalar Point Multiplication
Twisted Edward Curve
biblio
Elliptic curve and Lattice cryptosystem
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
lattice
Vectors
square matrices
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
matrix algebra
Lattices
lattice-based cryptography
lattice cryptosystem
closest vector problem
Homomorphic encryption
finite local ring
encryption
Elliptic curves
Elliptic curve over a ring
Elliptic curve cryptography
elliptic curve
discrete logarithm
digital signatures
Diffie-Hellman
cryptography method
conjugate problem
biblio
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
IoT security
Xilinx platform studio tool
Virtex-5 xc5vfx70t device based platform
Software
secure data transaction
Scalability
RNS implementation
Resiliency
resilience
residue number systems
residue number system (RNS)
residue number system
public key cryptography
pubcrawl
Metrics
IoT Security.
C language
Internet of Things
hardware-software codesign implementation
hardware-software codesign
Hardware software codesign
Hardware
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC cipher
digital signatures
digital signature
compute-intensive components
Communication Systems
Ciphers
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Fault detection method
smaller keys
Scalability
Resiliency
resilience
public key cryptosystems
public key cryptography
pubcrawl
power consumption
Montgomery Scalar Multiplication algorithm
Montgomery ladder
Metrics
key sizes
Hardware
fault injection attack
fault diagnosis
Circuit faults
fault detection
Fault Attacks
embedded devices
Elliptical Curve Cryptography
Elliptic curves
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
efficient fault detection method
efficient countermeasure
ECC
cryptographic computation
Conferences
classical asymmetric cryptosystems
biblio
Efficient Implementation of Cryptography on Points of an Elliptic Curve in Residue Number System
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Metrics
weighted number system
Scalability
RNS
Resiliency
resilience
residue number systems
residue number system
public key cryptography
pubcrawl
Modular Multiplication
adding points
Mathematical model
Jacobian matrices
Galois fields
Elliptic curves
Elliptic curve cryptography
elliptic curve
doubling points
Cryptography
computational complexity
arithmetic operations
biblio
Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
ECC
State Cryptography Administration
SM2 signature generation schemes
SM2 digital signature generation
SM2
secure cloud cryptography computing
secret sharing based cryptography
key exchange schemes
elliptic curve public key cryptography algorithm
additively homomorphic encryption
China
secret sharing
Homomorphic encryption
Cloud Computing
Elliptic curves
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
Software
data encryption
encryption
digital signature
Scalability
biblio
Fully homomorphic encryption scheme on a nonCommutative ring R
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
fully homomorphic encryption scheme
Scalability
Resiliency
pubcrawl
noncommutative ring
Non commutative ring
Metrics
Large scale integration
Human Factors
Homomorphic encryption
Cloud Computing
Fully homomorphic cryptosystems
encryption scheme
encryption
Elliptic curves
Elliptic curve cryptography
Cryptography
conjugate problem
conjugate gradient methods
Conjugal problem
biblio
Research on RFID Information Security Technology Based on Elliptic Curve Algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
security mechanism
RFIDs
traditional RSA public key cryptography
storage space
RFID system
RFID information security technology
RFID information security
potential security hazard
hardware conditions
elliptic curve algorithms
elliptic curve algorithm
encryption
radiofrequency identification
Elliptic curves
Elliptic curve cryptography
security problem
public key cryptography
Mathematical model
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
Parallel DNA Computing Model of Point-Doubling in Conic Curves Cryptosystem over Finite Field GF(2ˆn)
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
mathematical curves
Tile Assembly Model
self-assembly
Resiliency
resilience
public key cryptography
pubcrawl
privacy
Predictive Metrics
point-multiplication
point-doubling
point-addition
Point doubling
parallel DNA computing model
Metrics
biocomputing
Human behavior
Galois fields
Finite Field GF(2ˆn)
finite field GF
encoding
Elliptic curves
Elliptic curve cryptography
DNA cryptography
DNA computing
DNA
Cryptographic Protocols
conic curves cryptosystem over finite held
Conic Curves Cryptosystem
Computational modeling
biblio
A variant of the Schnorr signature using an elliptic curve over a field of characteristic two
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
pubcrawl
standards
software engineering
Schnorr signature scheme
Schnorr signature
scalar multiplication
Scalability
Resiliency
public key cryptography
authentication
koblitz Curve
Elliptic curves
elliptic curve
double-and-add scalar multiplication
digital signatures
digital signature
computer science
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »