Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum cryptography
biblio
Single Trace Side Channel Analysis on Quantum Key Distribution
Submitted by grigby1 on Tue, 10/08/2019 - 3:45pm
Resiliency
quantum computer
quantum computing
quantum cryptography
Quantum Key Distribution
quantum physics
quantum properties
random key generation
random number generation
resilience
QKD system
Scalability
Secret key
Side-channel attack
side-channel attacks
single electromagnetic trace
Single Trace Attack
single trace side channel analysis
stable key generation
weak random number generators
Phase modulation
Cryptographic Protocols
Diffie-Hellman key exchange
Electromagnetics
EM analysis
Human behavior
key exchange protocols
Metrics
number theoretic problems
number theory
BB84 protocol
phase modulator
Photonics
plug-and-play
plug-and-play QKD system
private key cryptography
Protocols
pubcrawl
QKD
biblio
High Speed Device-Independent Quantum Random Number Generation without Detection Loophole
Submitted by grigby1 on Tue, 10/08/2019 - 3:44pm
probability
Toeplitz matrix hashing
statistical fluctuations
Scalability
Resiliency
resilience
random processes
random number generation
random key generation
Quantum entanglement
quantum cryptography
pubcrawl
Bell theorem
Photonics
Metrics
Human behavior
Fluctuations
final random bit rate
Entropy
entangled photons
device-independent quantum random number generation
detection-loophole free Bell test
detection loophole
bit rate 114.0 bit/s
biblio
Genetic Algorithm to Study Practical Quantum Adversaries
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
composability
genetic algorithm
Metrics
pubcrawl
quantum computing
quantum computing security
quantum cryptography
resilience
Resiliency
Scalability
biblio
SIMULATION OF QUANTUM ENCODER DECODER WITH FLIP BIT ERROR CORRECTION USING REVERSIBLE QUANTUM GATES
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
QEC
security
Scalability
reversible quantum gates
Resiliency
resilience
Quantum technology
quantum noise
quantum information
quantum gates
Quantum error correction
quantum encoder & decoder
quantum cryptography
quantum computing security
quantum computing
Quantum circuit
composability
QCAD
pubcrawl
Metrics
Logic gates
logic circuits
Integrated circuit modeling
flip bit error correction
faulty quantum gates
fault-tolerant quantum computation
error correction codes
error correction
Decoding
Computational modeling
computation process
biblio
Quantum IoT: A Quantum Approach in IoT Security Maintenance
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
quantum mechanics laws
pubcrawl
Quantum approach
quantum channel
quantum communication
quantum computing
quantum computing security
quantum cryptography
quantum cryptography BB84 protocol
Quantum IoT
Protocols
quantum state
Qubit
resilience
Resiliency
Scalability
security of data
Security Processing Security
telecommunication security
greater security design
classical communication
Cloud Computing
complex management
composability
Cryptographic Protocols
data dynamics
data generation process
data storage
BB84 protocol
hybrid management
Internet of Things
IoT security infrastructure
IoT security maintenance
Metrics
One Pad Cryptography
Predictive Metrics
privacy
biblio
Research on Multi-Source Data Security Protection of Smart Grid Based on Quantum Key Combination
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
Quantum mechanics
power engineering computing
Power Grid
Predictive Metrics
pubcrawl
quantum cryptography
quantum communication
quantum computing security
quantum key combination
power data protection
resilience
Resiliency
Scalability
segmentation and combination of key
segmentation technology
Smart Grid
smart power grids metrics
Business
power communication network
multisource data security protection
Microelectronics Security
Microelectronics
Metrics
key updating
key segments
encryption
Data protection
composability
communication terminals
communication security
combination technology
business terminals
business data
biblio
A Scalable and Flexible Multi-User Semi-Quantum Secret Sharing
Submitted by aekwall on Mon, 06/17/2019 - 9:28am
composability
pubcrawl
quantum cryptography
Quantum secret sharing
scalable
security scalability
Single-qubit measurements
biblio
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM
Submitted by aekwall on Mon, 03/18/2019 - 8:53am
key sizes
black box encryption
quantum random oracle models
quantum cryptography
quantum computing
public key cryptography
Public key
postquantum security
post-quantum cryptographic schemes
post-quantum cryptographic primitives
post quantum cryptography
module lattices
Learning with errors
Lattices
key-establishment protocols
key-encapsulation mechanism
digital signature
key encapsulation
CRYSTALS - Kyber
CPA-secure public-key encryption scheme
ciphertext sizes
CCA-secure module-lattice-based KEM
CCA-secure KEM
authenticated-key-exchange schemes
Metrics
composability
pubcrawl
Resiliency
Electronic mail
Protocols
Cryptographic Protocols
encryption
biblio
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
NIST post-quantum cryptography project submissions
validation tools
tools
taint analysis
static analysis
source code
quantum cryptography
pubcrawl
Proposals
program diagnostics
post-quantum cryptography algorithms
NIST post-quantum standardization project
cache storage
NIST
Metrics
leakage pattern detection
execution behavior
encryption
development cycle
dedicated vulnerability research tool
cryptographic algorithms
composability
cache-timing vulnerabilities
cache-timing attacks
biblio
Cryptographic and Non-Cryptographic Network Applications and Their Optical Implementations
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
optical implementations
theoretical cryptography
signal processing
secret keys
quantum version
quantum theory
quantum optics
quantum optical versions
Quantum mechanics
quantum mechanical signals
quantum key distribution protocols
quantum advantage
prominent examples
Optical pulses
pubcrawl
noncryptographic network applications
mere conceptual value
Communication Systems
classical signal structures
abstract protocols
quantum cryptography
quantum computing
Optical fiber networks
Optical detectors
Compositionality
Fingerprint recognition
Protocols
composability
« first
‹ previous
1
2
3
4
5
6
next ›
last »