Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptanalysis
biblio
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
Hash Function
Secure hash algorithms
pseudo-random number generator
occupational safety
Algorithms
SHA
attacks
cryptanalysis
information science
hash algorithms
pubcrawl
Hash functions
Resistance
Compositionality
NIST
Cryptography
Generators
Heuristic algorithms
Resiliency
resilience
biblio
An Enhanced and Secure Multiserver-based User Authentication Protocol
Submitted by aekwall on Tue, 10/12/2021 - 3:07pm
composability
protocol verification
smart cards
protocol
Multiserver
ProVerif
cryptanalysis
policy-based governance
Compositionality
security
pubcrawl
Protocols
authentication
Servers
privacy
password
Cryptography
biblio
Optimisation of Lightweight Klein Encryption Algorithm With 3 S-box
Submitted by aekwall on Mon, 10/04/2021 - 2:06pm
Resiliency
Pervasive Computing Security
S-box
Random access memory
Klein encryption
cryptanalysis
WSN
Ciphers
Software algorithms
Human Factors
Metrics
Scalability
pubcrawl
encryption
performance evaluation
wireless sensor networks
IoT
biblio
A4: A Lightweight Stream Cipher
Submitted by grigby1 on Wed, 08/18/2021 - 11:14am
cryptanalysis
FCSR
LFSR
Lightweight
Lightweight Ciphers
pubcrawl
resilience
Resiliency
Scalability
Seedbox
stream cipher
biblio
Chaos-based Image Encryption using Integer Wavelet Transform
Submitted by aekwall on Mon, 02/08/2021 - 1:52pm
wavelet transforms
key-dependent bit scrambling
IWT
Integer Wavelet Transform
image decryption algorithm
hyperchaotic mapping
global bit scrambling
GBS
feebler resistance
DNA-coding based encrypting methods
chaos-based image encryption techniques
bit scrambling
DNA cryptography
Cryptography
cryptanalysis
chaotic map
Image Processing
Histograms
Predictive Metrics
Signal processing algorithms
Entropy
privacy
pubcrawl
Human behavior
Resiliency
encryption
biblio
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
information leakage attack
visualization
visual secret sharing
user anonymity
two-factor user authentication framework
strong authentication scheme
session key establishment
Servers
pubcrawl
password
mutual authentication
middle attack
authentication
Human behavior
essential security services
enhanced user participating authenticating scheme
dynamic session key fur subsequent communication
Cryptography
cryptanalysis
composability
client-server internetworking systems
Chen and Huang scheme
captchas
CAPTCHA
biblio
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
NIST curves
IoT-connected healthcare system
key policy attribute based encryption
Key Policy Attribute Based Encryption (KP-ABE)
key-policy
KP-ABE
Lightweight
lightweight key-policy attribute-based encryption scheme
Logic gates
Internet of Things (IoT)
policy-based governance
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
selective-set model
smart phones
delegation feature
Attribute-based
biomedical communication
Chosen-plaintext attack
ciphertext indistinguishability
collaboration
computer network security
cryptanalysis
decryption key
Android phone
encryption
fixed KP-ABE scheme
H-KP-ABE
health care
hierarchical
hierarchical KP-ABE
Internet of Things
biblio
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
Complexity theory
one-time code-based digital signature scheme
key recovery attack
information set decoding
code-based cryptography
attack complexity
cryptanalysis
Hamming weight
Secret key
Scalability
statistical analysis
public key cryptography
digital signatures
Decoding
Cryptography
pubcrawl
Resiliency
biblio
Cryptanalysis and improvement of a cloud based login and authentication protocol
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
online banking system
impersonation attack
internet
medium scale banking organization
Metrics
Mobile banking
mobile computing
multifactor authentication
Online banking
Human Factors
pubcrawl
public cloud
resilience
Resiliency
security
Servers
small scale banking organization
authentication
Human behavior
high-speed online services
Fingerprint recognition
electronic banking
e-banking services
e-banking
Cryptographic Protocols
cryptanalysis
cloud server
Cloud Computing
cloud based login
Business
bank data processing
authorisation
authentication protocol
biblio
Hybrid Method to Implement a Parallel Search of the Cryptosystem Keys
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
parallel search
GA environments
Generators
genetic algorithms
interconnected sequence parts
Interconnected sequences
LFSR
Mathematical model
parallel processing
GA
parallelism
pubcrawl
sequences recognition mechanism
successive cipher characters
theoretical cryptography
theoretical principles
three-level contributions
basic encryption key
final key sequence mechanism
DNA strands
DNA computing
DNA
cryptosystem keys
Cryptography
cryptanalysis
counter value
Compositionality
composability
Ciphers
character files
biocomputing
binary sequences
binary equations system
1
2
3
next ›
last »