Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum cryptography
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
linear codes
theoretical cryptography
structural attacks
strong mathematical background
side-channel attacks
public-key cryptosystem
public-key cryptography
post-quantum standardization
Post-quantum cryptography
polynomials
polynomial time
oldest quantum-resistant proposition
number theory problems
number theory
NIST's announcement
McEliece scheme
pubcrawl
elliptic curve
discrete logarithm
coding theory
code-based cryptography
adequate post-quantum cryptographic schemes
quantum cryptography
side-channel analysis
public key cryptography
quantum computer
Decoding
Computers
Compositionality
physical attacks
encryption
composability
biblio
Post-Quantum Algorithm of Asymmetric Encryption and Its Basic Properties
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Metrics
ring
Resiliency
resilience
quotient ring
quantum cryptography
quantum computing
Public key
post-quantum algorithm
polynomial
NTRU-like cryptosystem NTRU Prime IIT Ukraine
NIST
pubcrawl
Human behavior
field
end-to-end encryption type
encryption
encoding
cryptographic transformations
Computers
Compositionality
composability
basic properties
Asymmetric Encryption
biblio
A Multiple Paths Scheme with Labels for Key Distribution on Quantum Key Distribution Network
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
resilience
universal net topologies
trusted relay
Trust Routing
Topology
Three-dimensional displays
strategy of stochastic paths with labels
Stochastic processes
Scalability
Resiliency
combined security proportion
quantum key distribution network
quantum cryptography
pubcrawl
probability model
probability
multiple paths scheme with labels
multiple paths scheme
composability
biblio
Towards Lightweight Identity-Based Encryption for the Post-Quantum-Secure Internet of Things
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
key discovery procedure
word length 80 bit
time 36 ms
time 103 ms
RLWE problem
Resiliency
resilience
reconfigurable hardware component
quantum cryptography
pubcrawl
post-quantum-secure Internet of Things
multiuser scenarios
microcontrollers
Metrics
low-cost ARM Cortex-M0 microcontroller
lightweight identity-based encryption
ad-hoc network connection
Internet of Things
internet
Identity-based encryption
IBE scheme
Human behavior
encryption
embedded device
decryption
data exchange security
computer network security
Compositionality
asymmetric key distribution problem
Asymmetric Encryption
ASIACRYPT 2014
biblio
A Practical Quantum Public-Key Encryption Model
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
public key cryptography
secret keys
Resiliency
resilience
quantum trapdoor one-way function
quantum public-key encryption model
quantum public key encryption model
Quantum mechanics
quantum information security
quantum cryptography
quantum computing
black box encryption
Public key
pubcrawl
Metrics
encryption
decryption process
Computational modeling
computational indistinguishability
composability
blackbox client-side
biblio
Quantum approach to the information privacy in Smart Grid
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
pubcrawl
smart power grids
Smart Grids
Smart Grid Privacy
Smart Grid
Schedules
Scalability
Resiliency
resilience
Quantum Key Distribution
quantum cryptography
Communication networks
Protocols
power system security
information privacy
Human Factors
Human behavior
encoding
data privacy
Cryptography
complex grid system
biblio
System-level considerations for modeling space-based quantum key distribution architectures
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
Scalability
Policy-Governed Secure Collaboration
pubcrawl
quantum cryptography
Quantum Key Distribution
Quantum mechanics
quantum theory
Resiliency
revolutionary technology
Photonics
Science of Security
security
single photon propagation
space-based QKD architectures
system-level considerations
terrestrial QKD systems
unconditional security
Human Factors
Atmospheric modeling
collaboration
composability
cryptographic keying material
encryption
global secure key distribution
ground stations
Human behavior
Architectures
LEO QKD satellite
low Earth orbit QKD satellite
Low earth orbit satellites
Metrics
Model and Simulation
modeling space-based quantum key distribution architectures
Performance
biblio
Quantum color image encryption based on multiple discrete chaotic systems
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
logistic Chebyshev map
XOR operation
statistical attacks
Resiliency
quantum image encryption algorithm
quantum encryption algorithm
quantum cryptography
quantum controlled-NOT image
quantum color image encryption
pubcrawl
multiple discrete chaotic systems
Metrics
Logistics
Algorithm design and analysis
image colour analysis
Histograms
encryption process
encryption
differential attacks
composability
Color
Chebyshev approximation
chaotic logistic map
chaotic cryptography
chaos
asymmetric tent map
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
Radio frequency
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
matrix algebra
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
Algorithm design and analysis
key generation process
Human Factors
Human behavior
Galois fields
finite field
Ergodic Matrix
EPC code
encryption process
encryption
Databases
counterfeit
BMQE system
BMQ polynomials
bisectional multivariate quadratic equation system
anticounterfeit scheme
biblio
Backchanneling Quantum Bit (Qubit) 'Shuffling': Quantum Bit (Qubit) 'Shuffling' as Added Security by Slipstreaming Q-Morse
Submitted by grigby1 on Fri, 11/03/2017 - 11:33am
random radicals
predicted-expected sender-receiver properties
pubcrawl
public key cryptography
Quantum bit (Qubit)
quantum computing
quantum cryptography
quantum cyphers
Quantum entanglement
Morse
Resiliency
Rivest-Shamir-Adleman
RSA
Scalability
sensors
Shuffling
slipstreaming Q-Morse code
containment wave
backchanneling qubit shuffling
Backchannelling
backchannelling quantum Morse code
blockchain ledger history
blockchain security
Ciphers
codes
communication security
backchanneling quantum bit shuffling
Cypher
digital signature algorithm
DSA
ECDSA
elliptic curve digital signature algorithm
Entanglement
Internet of Things
« first
‹ previous
1
2
3
4
5
6
next ›
last »