Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptanalysis
biblio
State Recovery Attacks Against \$\textbackslashpi\$-cipher
Submitted by grigby1 on Fri, 09/15/2017 - 11:01am
ARX
Caesar
cryptanalysis
divide and conquer attack
Lightweight Ciphers
pubcrawl
Resiliency
sponge construction
π-cipher
biblio
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding
Submitted by grigby1 on Mon, 04/03/2017 - 11:51am
Adversary Models
ciphertext-only attack
composability
cryptanalysis
information-theoretic security analysis
Metrics
orthogonal blinding
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
theoretical cryptography
biblio
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
NIST randomness test
telecommunication security
symmetric-key cryptographic operations
Security analysis
RFID tags
randomness test
random number generation
radiofrequency identification
pubcrawl170112
polynomials
NIST SP800-22
cryptanalysis
NIST
low-cost RFID tags
lightweight pseudorandom number generators
lightweight PRNG
LFSR-based PRNG security
international RFID standards
Generators
EPC Gen2 tags
EPC Gen2 RFID tag
Cryptography
biblio
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
quadratic residue
supply chains
Supply Chain
Servers
Security analysis
security
secure RFID tag ownership transfer protocol
RFID-OT protocol improvement
RFID
radiofrequency identification
radio frequency identification
Quadratic Residues
cryptanalysis
pubcrawl170112
Protocols
protocol
probability
privacy
Ownership Transfer
Information systems
desynchronization attack
Cryptography
Cryptographic Protocols
biblio
Physically Unclonable Digital ID
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
physically unclonable function
Hash functions
identification of persons
identity management systems
Immune system
mobile hardware security
Optical imaging
Optical sensors
physically unclonable digital ID
encryption keys
pubcrawl170109
PUF
Q-PUDID
quasi-PUDID
random number generation
Servers
two-factor authentication
Access Control
dynamic human identity
digital signatures
digital identity thefts
device authentication
descrambler-hardware authentication
cyber security
Cryptography
cryptanalysis
computer security
Cloning
clonable static information
center for strategic and international studies
biometrics
authorisation
authentication
biblio
"New Secured Steganography Algorithm Using Encrypted Secret Message inside QRTM Code: System Implemented in Android Phone"
Submitted by grigby1 on Tue, 02/14/2017 - 12:16pm
encryption
three-step security
Steganography
standards
smart phones
secured steganography algorithm
QRTM Code
QR codes
QR code
pubcrawl170102
mobile radio
android
encrypted secret message
Cryptography
cryptanalysis
Computers
computer science
Ciphers
bit level columnar transposition method
Android phone
Android mobile environment
biblio
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
message authentication
Yung-Cheng-Lee's protocol
verification table
user impersonation attack
smart cards
Smart card
session key
Servers
server impersonation attack
remote user authentication protocol
Protocols
password change phase
authentication
legitimacy verification
insider attacks
insecure channel
dynamic id
denial-of-service attack
Cryptography
Cryptographic Protocols
cryptanalysis
computer network security
Bismuth
biblio
An architectural framework for encryption amp; generation of digital signature using DNA cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 11:05am
DNA computing DNA cryptography
Steganography
plaintext size
key size
information security
encryption time
encryption algorithms
encryption
encoding
DNA digital coding
DNA cryptography
architectural framework
DNA computing
DNA
digital signatures
digital signature generation
digital signature encryption
decryption time
cryptanalysis
Ciphers
biocomputing
« first
‹ previous
1
2
3