Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptosystems
biblio
An Efficient Key Generation Scheme for Secure Sharing of Patients Health Records using Attribute Based Encryption
Submitted by grigby1 on Thu, 07/13/2023 - 12:48pm
Manuals
personal health record
efficient encryption
Key Distribution
key generation
public key cryptosystems
attribute-based encryption
Scalability
simulation
encryption
composability
Computational modeling
Medical services
Resiliency
resilience
pubcrawl
Cloud Computing
biblio
Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
time 0.0164 s
pubcrawl
public key cryptography
public key cryptosystems
Resiliency
RSA key generation
Scalability
Signature Generation
signature verification
time 0.001 s
time 0.002 s
time 0.004 s
post-quantum digital Signature algorithms
time 0.0187 s
time 0.0778 s
time 0.1378 s
time 0.2012 s
time 13.494 s
time 16.29 s
time 17.474 s
time 2.0E-4 s
verification time
W-OTS key generation
cryptographic systems security
security
bitcoin transaction security
Bitcoin transactions
classical algorithms
Comparative Analysis
Computer crime
Computers
creating digital signatures
cryptocurrencies
cryptocurrency
Cryptographic Protocols
bitcoin
Cryptography
current day algorithms
digital signatures
ECDSA key generation
Elliptic curves
encryption
Hash-based Signature Schemes
hash-based signatures
MSS Key generation
Post-quantum cryptography
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:33am
RSA
work flow
Terminology
public key cryptosystems
public key cryptosystem
Pailier
in-direct rapid homomorphic encryption
homomorphic encryption schemes
homomorphic cryptosystem
ElGamal based algebric homomorphic encryption
crypto-algorithms
Brakerski-Gentry-Vaikuntanathan model
Application of Homomorphic Encryption
Homomorphic encryption
Fog computing
Human Factors
Cloud Computing
edge computing
security threats
False Data Injection
public key cryptography
Data protection
Metrics
privacy
pubcrawl
Resiliency
data encryption
data integrity
encryption
Data Security
Servers
Scalability
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Fault detection method
smaller keys
Scalability
Resiliency
resilience
public key cryptosystems
public key cryptography
pubcrawl
power consumption
Montgomery Scalar Multiplication algorithm
Montgomery ladder
Metrics
key sizes
Hardware
fault injection attack
fault diagnosis
Circuit faults
fault detection
Fault Attacks
embedded devices
Elliptical Curve Cryptography
Elliptic curves
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
efficient fault detection method
efficient countermeasure
ECC
cryptographic computation
Conferences
classical asymmetric cryptosystems
biblio
Efficient modular multiplication algorithms for public key cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 11:07am
modular exponentiation
word length
substitute and reward algorithms
store and forward algorithms
RSA
public key cryptosystems
Public key cryptography(PKC)
public key cryptography
modular multiplication algorithms
Modular Multiplication
Algorithm design and analysis
encryption
digital signatures
digital signature schemes
cryptographic transformations
Conferences
Ciphers
bit forwarding algorithms
binary exponentiation
BFW algorithms