Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Elliptic curves
biblio
On Secure Implementations of Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Submitted by grigby1 on Wed, 05/30/2018 - 4:06pm
Scalability
pubcrawl
public key cryptography
quantum computing
quantum-resistant SIDH protocol
quantum-resistant supersingular isogeny Diffie-Hellman protocol
random number generation
resilience
Resiliency
Protocols
secret kernel point
secret scalars
side-channel analysis
signature based defense
simple power analysis
timing
timing attacks
true random number generator
Elliptic curves
Cryptographic Protocols
Cryptography
Differential Power Analysis
double-point multiplication
ECDH key exchange
Electronic mail
elliptic curve Diffie-Hellman key exchange
elliptic curve isomorphism
ALU
elliptic curve theory
Fault Attacks
Fermat little theorem inversion
Hardware
hardware architectures
isogeny-based cryptography
oracle attacks
Post-quantum cryptography
biblio
The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
Elliptic curves
Supercomputers
RSA algorithm
Resistance
Resiliency
resilience
pubcrawl
Metrics
method
Human behavior
GOST R 34.10-2001 algorithm
encryption
Algorithm design and analysis
durability
Cryptography
cryptographic strength
computer technology
Compositionality
Clustering algorithms
asymmetric encryption algorithms
asymmetric encryption algorithm
Asymmetric Encryption
Assessment
biblio
A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
replay-attack prevention
multi-receiver encryption
mutual authentication
pairing operations
performance evaluations
private key cryptography
pubcrawl
Public key
public key cryptography
Receivers
Metrics
resilience
Resiliency
Scalability
Schnorr
Schnorr-like lightweight identity-based partial private keys
sensitive personal data disclosure prevention
source authentication
Trusted Computing
trusted third party
encryption
android encryption
authentication
decryption
device to device communications
device-generated public keys
disclosure range control
Elliptic curves
embedded Android devices
embedded systems
Android (operating system)
Human behavior
Human Factors
implicit user authentication
Internet of Things
IoT (Internet of Things)
IoT applications
lightweight multireceiver encryption
message authentication
message integrity
biblio
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
provably secure anonymous attestation
trusted platform modules
Trusted Platform Module
Trusted Computing
TPM 2.0 interfaces
standards
security chip
Secret key
Resiliency
Remote Attestation
q-SDH-based anonymous attestation
pubcrawl
attestation signature
Protocols
private key cryptography
privacy
LRSW-based anonymous attestation
fraudulent TPM
Elliptic curves
Diffie-Hellman oracle
Cryptography
cryptographic keys management
composability
Complexity theory
biblio
A privacy-preserving homomorphic encryption scheme for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
hop-by-hop encryption
smart things
sensors
secure cooperation
secret sharing
Scalability
resource constrained devices
Resiliency
pubcrawl
privacy homomorphism
Metrics
Logic gates
IoT
Internet of Things
Human Factors
Additives
Homomorphic encryption
heterogeneous smart things
fully additive secret sharing
fully additive encryption
end-to-end encryption
encryption
Elliptic curves
elliptic curve
disruptive paradigm
data concealment
data analysis module
Cryptography
context-aware decision mechanisms
ambient environment
biblio
Scalability of CPU and GPU Solutions of the Prime Elliptic Curve Discrete Logarithm Problem
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
Measurement
sequential algorithms
security scalability
Scalability
public key cryptography
pubcrawl
Pollard Rho
Partitioning algorithms
parallelism metrics
parallel processing
Parallel Collision Search based solution
parallel algorithms
microprocessor chips
big integer libraries
graphics processing units
GPU solutions
gpu
Elliptic curves
elliptic curve discrete logarithm problem
elliptic curve asymmetric cryptographic systems
ECDLP
Cryptography
cryptographic systems
CPU solutions
bit-length system
biblio
A new elliptic curve cryptographic system over the finite fields
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
pubcrawl
matrix algebra
Menezes Qu Vanstone encryption protocols
message authentication
Metrics
network communications
private key cryptography
private key matrices
Protocols
Mathematical model
public key cryptography
public key vectors
Resiliency
Scalability
secure communication
security
square matrices
Cayley Hamilton theorem
key exchange authentication
invertible matrix
finite fields
encryption
Elliptic curves
Elliptic curve cryptography
elliptic curve cryptographic system
ElGamal
ECC
Discrete Logarithms Problems
discrete logarithms
Diffie Hellman protocol
cyber security
cryptosystems
Cryptographic Protocols
biblio
Evolving side-channel resistant reconfigurable hardware for elliptic curve cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Metrics
Xilinx Kintex-7 FPGA
timing attacks
side-channel resistant reconfigurable hardware
side-channel attacks
security-level
Scalability
Resiliency
reconfigurable hardware design
public-key cryptosystems
public key cryptography
pubcrawl
propagation delay minimization
power analysis attacks
noninvasive side channel attacks
minimisation
Algorithm design and analysis
Hardware
genetic algorithms
genetic algorithm
fitness function
field programmable gate arrays
Evolutionary algorithm
Elliptic curves
elliptic curve discrete logarithm
Elliptic curve cryptography
elliptic curve cryptographic hardware
elliptic curve cryptographic combinational logic circuits
Cryptographic Protocols
cryptographic applications
combinational circuits
circuit size minimization
biblio
A Review of Signcryption Schemes Based on Hyper Elliptic Curve
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
authentication
digital signature
digital signatures
Elliptic curve cryptography
Elliptic curve cryptography (ECC)
Elliptic curves
encryption
Hyper Elliptic Curve Cryptography (HECC)
Metrics
pubcrawl
Resiliency
Scalability
Signcryption
biblio
Research on the Underlying Method of Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
elliptic curve
Elliptic curve cryptography
Elliptic Curve Cryptosystem
Elliptic curves
finite field
Galois fields
generator
Generators
group
Metrics
pubcrawl
Receivers
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »