Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RSA
biblio
Application of Bio-inspired Algorithms to the Cryptanalysis of Asymmetric Ciphers on the Basis of Composite Number
Submitted by aekwall on Mon, 01/10/2022 - 12:47pm
RSA
Compositionality
Resiliency
quadratic sieve
integer factorization
Genetics
genetic algorithm
fitness function
bio-inspired algorithms
Asymmetric Encryption
Reliability
genetic algorithms
Prototypes
Approximation algorithms
Human behavior
Metrics
pubcrawl
Public key
encryption
biblio
Detection of Trojan Based DoS Attacks on RSA Cryptosystem Using Hybrid Supervised Learning Models
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
machine learning algorithms
Trojan horses
trojan horse detection
supply chain security
security
RSA
Resiliency
resilience
pubcrawl
Power profile
chipwhisperer
machine learning
Integrated circuit modeling
hardware Trojan horses
Hardware
Data models
cyber physical systems
cyber physical security
Cryptography
composability
biblio
Presenting IoT Security based on Cryptographic Practices in Data Link Layer in Power Generation Sector
Submitted by grigby1 on Wed, 09/01/2021 - 2:13pm
IoT
Scalability
SCADA
RSA
Reliability
pubcrawl
power generation
PLC
optimization
NTPC.
AES
Internet of Things
I/O
i-o systems security
DES
DDCMIS
DCS
Cryptography
control systems
biblio
Combination RSA with One Time Pad for Enhanced Scheme of Two-Factor Authentication
Submitted by grigby1 on Thu, 07/08/2021 - 3:38pm
authentication
decryption
encryption
Force
Human behavior
Human Factors
One Time Pad
pubcrawl
Public key
Resistance
Robustness
RSA
security
two factor authentication
two-factor authentication
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
mistrust server
token ID
three-factor authentication scheme
three factor authentication
Source code analysis
Software
Servers
searchable encryption scheme
searchable encryption
Scalability
RSA
Resiliency
pubcrawl
password
pass-code
multi-factor
biometric encryption
Metrics
fingerprint identification
fingerprint
encryption
encrypted content
decryption
Cryptography
cloud server
Cloud Computing
biometrics
biometric fingerprint
authorisation
authentication
3FA
biblio
A Review of Recent Trends on DNA Based Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 1:53pm
Predictive Metrics
SHA
Multi Image Encryption
Medical Image
DNA encoding
DNA cryptography
image encryption
Biomedical imaging
AES
chaos
encoding
encryption
RSA
DNA
Entropy
privacy
Logistics
Cryptography
pubcrawl
Human behavior
Resiliency
security
biblio
Detection of Blind Signature Using Recursive Sum
Submitted by aekwall on Mon, 02/08/2021 - 1:45pm
digital signature
recursive sum
digital signature signing process
digital signature security
digital messages
data origin authentication
blinded version
blind source separation
blind signature detection
blind signature
Scalability
RSA
public key encryption
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
private key cryptography
encryption
biblio
Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation
Submitted by aekwall on Mon, 02/08/2021 - 1:45pm
Consumer electronics
Web-interface
software tools
secure key storage
institution electronic document circulation
GOST RF Standard 34.10–2018
electronic document circulation
electronic digital signature generation
documented information exchanging
cryptographic module
central Web-server
blockchain storage of electronic signatures
blockchain storage
ECDSA
Scalability
electronic digital signature
DSA
document handling
RSA
Information systems
digital signatures
software development
software engineering
blockchain
pubcrawl
Resiliency
Software
Cryptography
« first
‹ previous
1
2
3
4
5
6
next ›
last »