Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic transformations
biblio
Post-Quantum Algorithm of Asymmetric Encryption and Its Basic Properties
Submitted by grigby1 on Fri, 02/08/2019 - 3:21pm
Metrics
ring
Resiliency
resilience
quotient ring
quantum cryptography
quantum computing
Public key
post-quantum algorithm
polynomial
NTRU-like cryptosystem NTRU Prime IIT Ukraine
NIST
pubcrawl
Human behavior
field
end-to-end encryption type
encryption
encoding
cryptographic transformations
Computers
Compositionality
composability
basic properties
Asymmetric Encryption
biblio
Integrated methods of information security in telecommunication systems
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
Redundancy
encoding
encryption processes
encryption system
gaming
gamma sequence
generic polynomials
integrated information transformation method
noise-immune coding
dynamical chaos generators
restricted access information
stealth
telecommunication system
timer coding
timer signal construction
unauthorized access
verification elements
signal processing security
chaos
pubcrawl
Resiliency
privacy
information security
encryption
composability
Cryptography
Generators
Metrics
chaos generators
computer networks
cryptographic strength
cryptographic transformations
cyclic codes
data encryption
dynamic chaos sequence
biblio
Efficient modular multiplication algorithms for public key cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:07am
modular exponentiation
word length
substitute and reward algorithms
store and forward algorithms
RSA
public key cryptosystems
Public key cryptography(PKC)
public key cryptography
modular multiplication algorithms
Modular Multiplication
Algorithm design and analysis
encryption
digital signatures
digital signature schemes
cryptographic transformations
Conferences
Ciphers
bit forwarding algorithms
binary exponentiation
BFW algorithms