Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Secret key
biblio
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
Complexity theory
one-time code-based digital signature scheme
key recovery attack
information set decoding
code-based cryptography
attack complexity
cryptanalysis
Hamming weight
Secret key
Scalability
statistical analysis
public key cryptography
digital signatures
Decoding
Cryptography
pubcrawl
Resiliency
biblio
RAD: Reinforcement Authentication DYMO Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
demand protocol
Secret key
Compositionality
Encryption technique
mobility management (mobile radio)
malicious node
MANET security
authentication technique
average throughput
cryptographic operations
mobile ad hoc network
DYMO
dynamic MANET
infrastructure centralized server
MD5
Message Digest 5
RAD
reinforcement authentication DYMO protocol
Reinforcement.
Routing protocols
telecommunication security
Cryptographic Protocols
learning (artificial intelligence)
Resiliency
pubcrawl
Routing
Metrics
Reinforcement learning
authentication
encryption
message authentication
packet delivery ratio
telecommunication computing
delays
MANET
mobile ad hoc networks
Throughput
end to end delay
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
biblio
On Composability of Game-Based Password Authenticated Key Exchange
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Secret key
Password Authenticated Key Exchange
PKI
practical interest
Protocols
provably secure PAKEs
pubcrawl
public key cryptography
public-key infrastructure
password
secure channels
secure composition guarantees
simulation models
standards
Symmetric Key Protocol
telecommunication security
weak forward secrecy
game-based models
Composition Theorem.
Computational modeling
Cryptographic Protocols
Cryptography
data payload encryption
find-then-guess model
FtG model
game theory
composability
game-based password authenticated key exchange protocols
game-based real-or-random definition
Games
higher-level applications
higher-level SKPs
message authentication
PAKE protocols
biblio
Single Trace Side Channel Analysis on Quantum Key Distribution
Submitted by grigby1 on Tue, 10/08/2019 - 4:45pm
Resiliency
quantum computer
quantum computing
quantum cryptography
Quantum Key Distribution
quantum physics
quantum properties
random key generation
random number generation
resilience
QKD system
Scalability
Secret key
Side-channel attack
side-channel attacks
single electromagnetic trace
Single Trace Attack
single trace side channel analysis
stable key generation
weak random number generators
Phase modulation
Cryptographic Protocols
Diffie-Hellman key exchange
Electromagnetics
EM analysis
Human behavior
key exchange protocols
Metrics
number theoretic problems
number theory
BB84 protocol
phase modulator
Photonics
plug-and-play
plug-and-play QKD system
private key cryptography
Protocols
pubcrawl
QKD
biblio
A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
secret sharing
potential alternative
pubcrawl
public cloud data storage services
public cloud storage
public cloud storage service
Rabin's IDA output files
resilience
Resiliency
seamless secret sharing scheme implementation
Secret key
original file
Secure File Sharing
securing data
security
Servers
Shamir's SSA
short term
storage management
targeted file
targeting ordinary nontechnical users
Human behavior
Cloud Computing
Complexity theory
composability
Cryptography
data privacy
data security concern
defined public cloud storage services
defined service providers
file protection
free plans
authentication key
Human Factors
information dispersal
internet
local secure key-store
low-cost digital data
metadata
Metrics
nontechnical user
Organizations
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
provably secure anonymous attestation
trusted platform modules
Trusted Platform Module
Trusted Computing
TPM 2.0 interfaces
standards
security chip
Secret key
Resiliency
Remote Attestation
q-SDH-based anonymous attestation
pubcrawl
attestation signature
Protocols
private key cryptography
privacy
LRSW-based anonymous attestation
fraudulent TPM
Elliptic curves
Diffie-Hellman oracle
Cryptography
cryptographic keys management
composability
Complexity theory
biblio
Towards Mitigating Uncertainty of Data Security Breaches and Collusion in Cloud Computing
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Scalability
modified threshold Asmuth-Bloom
optimistic system behavior
pessimistic system behavior
private key cryptography
pubcrawl
Redundancy
Redundant Residue Number System
Resiliency
Metrics
Secret key
secret sharing schemes
speed per price ratio
system behavior optimization
uncertainty
uncertainty mitigation
weighted Mignotte secret sharing scheme
approximate method
localization improvement
error correction accuracy
encryption data redundancy minimization
detection improvement
data security breaches
data collusion
data access speed
Cryptography
Collusion
cloud parameter uncertainty
Cloud Computing
cloud collusion
big data security in the cloud
Big Data
balanced system behavior
biblio
Fingerprinting non-numeric datasets using row association and pattern generation
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
Pattern generation and row association schemes
internet
Metrics
Non-numeric datasets
nonnumeric digital data
original pattern
Outsourced Database Integrity
Ownership protection
ownership rights
pattern generation
Fingers
primary key
pubcrawl
relational data
relational databases
Resiliency
row association schemes
RSA encryption
Secret key
Watermarking
fake rows
business purposes
composability
Cryptography
data analysis
Decoding
digital rights protection
encryption
fake attributes
fake pattern
application environment
fast internet
Fibonacci series
fingerprint detection algorithm
fingerprint identification
Fingerprint recognition
fingerprint sequence
Fingerprinting
fingerprinting nonnumeric datasets
« first
‹ previous
1
2
3
next ›
last »