Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
modular exponentiation
biblio
A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching
Submitted by aekwall on Mon, 03/22/2021 - 12:14pm
exponentiation
semiinterleaved ladders
RSA cryptographic protocol
iterative conditional branching
interleaved variables
fully-interleaved ladders
fully-interleaved ladder properties
fully-interleaved cases
Countermeasures (computer)
Iterative algorithms
Montgomery ladder
interleaved codes
fault detection
Scalability
public-key cryptography
modular exponentiation
side-channel attacks
Registers
Space exploration
public key cryptography
Mathematical model
pubcrawl
Resiliency
Cryptographic Protocols
security
Cryptography
biblio
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing
Submitted by aekwall on Mon, 03/22/2021 - 12:14pm
Scalability
Servers
security
Protocols
Resiliency
pubcrawl
privacy
edge computing
public key cryptography
outsourcing
modular exponentiation
exponentiation
Secure outsourcing algorithms
biblio
Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication
Submitted by aekwall on Mon, 03/22/2021 - 12:13pm
multiplication temporal complexity
Vectors
vector-module method
vector-modular method
temporal complexity
Scalability
Resiliency
public key cryptography
pubcrawl
asymmetric cryptographic algorithms
multiplication
modular exponentiation
information flow encryption
information flow decryption
exponentiation
ElGamal cryptosystem
Elgamal cryptoalgorithm
biblio
Research in Fast Modular Exponentiation Algorithm Based on FPGA
Submitted by grigby1 on Tue, 01/21/2020 - 10:50am
Montgomery algorithm
systolic arrays
systolic array
Scalability
Resiliency
resilience
Q measurement
public-key cryptosystem
public-key cryptography
public-key algorithm
public key cryptography
pubcrawl
Montgomery modular multiplication
automation
Modular Multiplication
modular exponentiation on large number
modular exponentiation
mechatronics
logic design
frequency 170.0 MHz
FPGA
field programmable gate arrays
fast modular exponentiation algorithm
exponentiation
Erbium
Conferences
biblio
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
public key cryptography
Stochastic processes
stochastic method
stochastic heuristic approach
Side-channel attack
security effectiveness
Scalability
SCA
RSA cryptosystem
RSA
Resiliency
public-key cryptosystem
public-key cryptography
ACP
pubcrawl
PKC
multiplication-squaring operations
modular exponentiation
microsoft windows
Heuristic algorithms
exponentiation operation
exponentiation
dummy operations
Benchmark testing
addition chain problem
biblio
Optimizing Quantum Circuits for Modular Exponentiation
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
pubcrawl
verilog implementation
tools
scalable synthesis methods
Scalability
reversible modular exponentiation function
Resiliency
Qubit
Quantum error correction
Quantum Error Correcting Codes (QECC)
quantum computing
quantum computers
quantum circuits
quantum architectures
Quantum Algorithm(QA)
computer architecture
modular exponentiation functions
modular exponentiation
Logic gates
logic designs
logic design
logic circuits
linear nearest neighbor property
Linear Nearest Neighbor (LNN)
Hardware design languages
hardware description languages
exponentiation functions
exponentiation
error correction
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 1:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
biblio
Realization of RSA Cryptographic Algorithm Based on Vector-Module Method of Modular Exponention
Submitted by grigby1 on Mon, 12/30/2019 - 1:18pm
pubcrawl
Vectors
vector-module method
vector-modular method
Time complexity
temporal complexity
Scalability
RSA cryptosystem
RSA cryptographic algorithm
Resiliency
public key cryptography
computational complexity
Modular Multiplication
modular exponention
modular exponentiation
graph theory
exponentiation
encryption
Economics
Decoding
computer security
biblio
Reconfigurable Architecture to Speed-up Modular Exponentiation
Submitted by grigby1 on Mon, 12/30/2019 - 1:18pm
modular exponentiation
Xilinx Virtex 7 FPGA
Scalability
RSA protocols
Resiliency
reconfigurable architectures
Reconfigurable Architecture
random number generation
Random access memory
public key cryptography
pubcrawl
pseudorandom number generator
Pre-computation techniques
Modular Multiplication
batch multiplication
hardware architecture
Hardware
frequency 200.0 MHz
FPGA
field programmable gate arrays
exponentiation
digital arithmetic
Diffie-Hellman like protocols
Diffie-Hellman key pair
Cryptography
computer architecture
computationally intensive cryptographic operations
Clocks
biblio
Securing qr codes by rsa on fpga
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Modular Multiplication
XSG
VHDL
RSA
Resiliency
Receivers
QR codes
Public key
pubcrawl
Ciphers
modular exponentiation
image security
FPGA
field programmable gate arrays
encryption
cyber physical systems
Cryptography
1
2
next ›
last »