Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum computing
biblio
SP 800–22 and GM/T 0005–2012 Tests: Clearly Obsolete, Possibly Harmful
Submitted by aekwall on Thu, 02/02/2023 - 5:43pm
quantum computing
Stochastic Computing Security
stochastic models
Statistical Randomness Tests
SP 800–22
GM/T 0005–2012
entropy sources
trng
NIST
Computational modeling
Stochastic processes
Systematics
Resiliency
Scalability
pubcrawl
Analytical models
statistical analysis
biblio
Poisoning Attack against Online Regression Learning with Maximum Loss for Edge Intelligence
Submitted by grigby1 on Fri, 01/06/2023 - 4:18pm
Artificial Intelligence
regression task
edge intelligence
online learning
AI Poisoning
poisoning attack
Market research
resilience
Task Analysis
pubcrawl
edge computing
quantum computing
Computational modeling
Data models
Scalability
Resiliency
Human behavior
biblio
A Study of Post Quantum Cipher Suites for Key Exchange
Submitted by grigby1 on Fri, 09/16/2022 - 4:54pm
standardization
Supersingular Isogenies
Ring Learning With Errors (RLWE)
lattice cryptography
Key Pair Generation
Key exchange
Error Code Correcting
Cryptographic Benchmarking
Post Quantum Cryptography (PQC)
codes
Resiliency
security
Wires
forward error correction
digital signature
Resistance
composability
quantum computing
Computers
NIST
Metrics
pubcrawl
biblio
Split Compilation for Security of Quantum Circuits
Submitted by grigby1 on Fri, 08/12/2022 - 2:10pm
compiler security
Transpilation
Split
Overhead
obfuscation
Coupling Map
compilation
quantum computing
IP theft
reverse engineering
computer architecture
Software as a service
Metrics
Program processors
Routing
composability
Computers
Resiliency
pubcrawl
Logic gates
biblio
Performance Analysis of the Quantum Safe Multivariate Polynomial Public Key Algorithm
Submitted by grigby1 on Thu, 07/14/2022 - 6:13pm
Metrics
secure secret exchange
PQC
polynomial root finding
polynomial factoring
Multivariate Polynomial Public Key
MPPK
mathematical models
random key generation
Post-quantum cryptography
public key cryptography
pubcrawl
Java
Benchmark testing
quantum computing
NIST
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols
Submitted by grigby1 on Thu, 07/14/2022 - 3:44pm
pubcrawl
Hardware
Scalability
Protocols
Computers
quantum computing
Resistance
quantum cryptography
Market research
QKD
Technological innovation
classical cryptography
Key Distribution
quantum computing security
biblio
The Role of Quantum and Post-Quantum Techniques in Wireless Network Security - Status, Challenges and Future Trends
Submitted by grigby1 on Thu, 07/14/2022 - 3:43pm
pubcrawl
Scalability
Protocols
Computers
quantum computing
wireless networks
quantum cryptography
Market research
data communication
BB84
E91
Post-quantum
QKD.
quantum
quantum computing security
biblio
Managing Cyber Security with Quantum Techniques
Submitted by grigby1 on Thu, 07/14/2022 - 3:43pm
Cryptography
pubcrawl
Scalability
Computer crime
Planning
Computers
quantum computing
Quantum mechanics
Quantum Key Distribution
Post-quantum cryptography
quantum computing security
biblio
Recent Developments and Methods of Cloud Data Security in Post-Quantum Perspective
Submitted by grigby1 on Thu, 07/14/2022 - 3:43pm
Cryptography
Cloud Computing
pubcrawl
Scalability
Computers
quantum computing
Data Security
Redundancy
outsourcing
Post-quantum cryptography
quantum computing security
biblio
Code Structures for Quantum Encryption and Decryption
Submitted by grigby1 on Thu, 07/14/2022 - 3:42pm
quantum computing
encryption
pubcrawl
Scalability
privacy
encoding
Decoding
signal processing
Galois fields
quantum transforms
Reed-Muller codes
transform methods
quantum computing security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »