Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ECC
biblio
Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA
Submitted by aekwall on Mon, 02/15/2021 - 3:57pm
B-curves
standard methods
single design
resource sharing
P-curves
NIST Elliptic Curves
implemented designs
high-speed design
hardware components bus
frequency 1.0 GHz
exchanged messages
encrypting signing messages
field programmable gate arrays
modern communication systems
SCA
confidentiality
ECC
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
Scalability
biblio
Design of a Cloud Storage Security Encryption Algorithm for Power Bidding System
Submitted by aekwall on Mon, 01/25/2021 - 11:57am
file storage
Tendering and bidding
symmetrical encryption algorithm
symmetric encryption
storage management
Resiliency
public key cryptography
pubcrawl
power system security
power markets
power bidding system
plaintext upload file
Metrics
hybrid encryption method
Human behavior
file upload
AES
file encryption strength
file block
Electricity supply industry
ECC
composability
cloud storage security encryption algorithm
cloud storage files
cloud storage environment
cloud storage
cloud data storage
Cloud Computing
ciphertext file
asymmetric encryption algorithm
Asymmetric Encryption
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
Design of Data Confidential and Reliable Bee Clustering Routing Protocol in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 10:57am
reliable Bee clustering routing protocol
mobile ad hoc network
mobile ad hoc networks
multihop routing
packet forwarding ratio
packet forwarding statistics
pattern clustering
pubcrawl
public key cryptography
received packets
Metrics
reliable data transmission
resilience
Resiliency
Routing
Routing protocols
secure data delivery system
sensors
telecommunication security
wireless sensor networks
ECC
Bee Ad Hoc Clustering
bee clustering approach
Bee-Ad Hoc-C
Black hole attack
clustered based approach
Compositionality
data confidential
data privacy
data reliability
overhearing
Elliptic curve cryptography
Elliptical Curve Cryptography
Energy Efficiency
ensures data confidentiality
forwarded packets
IndexTerms-Mobile Ad Hoc Networks
legion intelligence
MANET
manet privacy
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
ECC
trusted scheme
SE-Enc
encoding scheme
asymmetric cryptography
Asymmetric Encryption
signature
Internet of Things devices
Compositionality
authenticated encryption
encoding
security requirements
encryption
Elliptic curves
Elliptic curve cryptography
Heuristic algorithms
public key cryptography
message authentication
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Internet of Things
biblio
Hybrid Encryption Algorithm Based on Wireless Sensor Networks
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
Compositionality
wireless sensor networks(WSNs)
hybrid encryption algorithm
encryption standard
data compression technology
cipher block
asymmetric/symmetric encryption algorithm
Asymmetric Encryption
elliptic curve encryption
AES
advanced encryption standard
ECC
public key cryptography
data compression
Metrics
wireless sensor networks
pubcrawl
Human behavior
Resiliency
private key cryptography
biblio
IoT Security in Wireless Devices
Submitted by grigby1 on Thu, 07/30/2020 - 1:15pm
Internet of Things
wireless sensor networks
wireless devices
Wireless communication
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
IoT security
IoT
Internet of Things framework
Communication system security
internet
interconnected devices
Human Factors
Human behavior
encryption
Elliptic curve cryptography
ECC (elliptic curve cryptography)
ECC
Conferences
computer network security
composability
biblio
Fault tolerant non-linear techniques for scalar multiplication in ECC
Submitted by aekwall on Mon, 07/06/2020 - 8:57am
asymmetric cryptography algorithms
shorter key length
Scalar multiplication point
nonlinear error detection codes
injected faults
faulty results
fault tolerant nonlinear techniques
Fault Tolerant
false information
error detection codes
elliptic curve scalar multiplication point
cryptographic computations
case channel error detection codes
Scalability
cryptology
ECC
Elliptic curve cryptography
security level
public key cryptography
fault tolerant computing
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
encryption
biblio
Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things
Submitted by grigby1 on Fri, 06/26/2020 - 11:55am
Internet of Things
Transportation
security protocols
Scalability
Resiliency
resilience
Public-Key Cryptosystems (PKC)
public-key cryptosystems
public key cryptography
pubcrawl
privacy and security
Metrics
Medical services
lightweight devices
IoT devices
Internet of Things (IoT)
computer architecture
indoor localization
healthcare facilities
health care
Hardware/Software Co-Design
hardware-software codesign
hardware-software co-design
Hardware
energy consumption
Elliptic-Curve Cryptography (ECC)
elliptic-curve cryptography
Elliptic curve cryptography
ECC
Cryptography
Cryptographic Protocols
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
Fault detection method
smaller keys
Scalability
Resiliency
resilience
public key cryptosystems
public key cryptography
pubcrawl
power consumption
Montgomery Scalar Multiplication algorithm
Montgomery ladder
Metrics
key sizes
Hardware
fault injection attack
fault diagnosis
Circuit faults
fault detection
Fault Attacks
embedded devices
Elliptical Curve Cryptography
Elliptic curves
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
efficient fault detection method
efficient countermeasure
ECC
cryptographic computation
Conferences
classical asymmetric cryptosystems
« first
‹ previous
1
2
3
4
next ›
last »