Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
asymmetric encryption scheme
biblio
A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
image encryption
symmetric encryption scheme
statistical attack
serpent-elliptic hybrid cryptosystem
Serpent algorithm
SERPENT
Resiliency
resilience
public key cryptography
pubcrawl
Multimedia systems
multimedia protection
Metrics
insecure networks
insecure channel
information security
Asymmetric Encryption
hybrid cryptosystem
Human behavior
encryption quality
encryption
Elliptic curves
Elliptic curve cryptography
differential attack
data encapsulation scheme
data encapsulation
Correlation
Compositionality
composability
asymmetric schemes key distribution
asymmetric encryption scheme
biblio
Analysis of asymmetric encryption scheme, AA \#x03B2; Performance on Arm Microcontroller
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Internet of Things
system-on-chip
system on chip
sensors
security protection
security
Scalability
Resiliency
random-access storage
Random access memory
public key cryptography
Public key
pubcrawl
microcontrollers
Metrics
Libraries
AA-Beta
Instruction cache
GNU multiple precision arithmetic library package
encryption
embedded microcontroller
Elliptic curve cryptography
digital arithmetic
Data Cache
Clocks
cache storage
asymmetric encryption scheme
Asymmetric
arm microcontroller
ARM Cortex-M7 microcontroller
AAβ
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization