Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum computing
biblio
Quantum computing with CMOS technology
Submitted by grigby1 on Thu, 07/14/2022 - 3:42pm
quantum computing
pubcrawl
Hardware
Scalability
Buildings
Technological innovation
information processing
drugs
CMOS
CMOS technology
Silicon
spins
Transistors
VLSI
quantum computing security
biblio
A Pragmatic Analysis of Pre- and Post-Quantum Cyber Security Scenarios
Submitted by grigby1 on Thu, 07/14/2022 - 3:42pm
Pragmatics
quantum computing security
technologies
quantum
problems
Oppel-2
Oppel-1
impact
cyber
Cryptic
information security
Market research
Resistance
Qubit
quantum computing
Computer crime
Cryptography
Scalability
security
pubcrawl
biblio
Enhancing Security in the Industrial IoT Sector using Quantum Computing
Submitted by grigby1 on Thu, 07/14/2022 - 3:41pm
computer architecture
Cloud Computing
pubcrawl
Generators
Scalability
Cryptography
Industrial IoT
Industries
quantum computing
Internet of Things
IBM Quantum
cyber physical systems
random number generators
fourth industrial revolution
QRNG
quantum computing security
biblio
The Multi-Output Quantum Pulse Gate: a Novel High-Dimensional QKD Decoder
Submitted by grigby1 on Thu, 07/14/2022 - 3:41pm
Logic gates
pubcrawl
Scalability
Computers
quantum computing
Decoding
Europe
Quantum Key Distribution
Electric potential
quantum computing security
biblio
Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted Data
Submitted by grigby1 on Thu, 07/14/2022 - 3:40pm
pubcrawl
Tomography
Scalability
quantum state
quantum machine learning
Quantum homomorphic encryption
quantum computing security
quantum computing
Quantum cloud computing
Computing Theory
privacy protection
machine learning algorithms
IBM Quantum Experience
feature extraction
dimensionality reduction
Cloud Computing
trust
biblio
New McEliece Cryptosystem Based on Polar-LDPC Concatenated Codes as a Post-quantum Cryptography
Submitted by grigby1 on Fri, 07/01/2022 - 8:29am
coding theory
Post-quantum resilience
McEliece Cryptosystem
LDPC codes
Asymmetric Encryption
codes
Resiliency
Resists
polar codes
security
parity check codes
Decoding
Metrics
Quantum mechanics
quantum computing
Computers
resilience
pubcrawl
biblio
Arithmetic Circuit Homomorphic Encryption Key Pairing Comparisons and Analysis between Elliptic Curve Diffie Hellman and Supersingular Isogeny Diffie Hellman
Submitted by grigby1 on Thu, 06/09/2022 - 2:41pm
Metrics
supersingular isogeny key exchange
Dragonfly Key Exchange
arithmetic circuit
Human Factors
Asia
Central Processing Unit
Homomorphic encryption
Elliptic curves
pubcrawl
quantum computing
Computers
standards
authentication
Scalability
advanced encryption standard
Resiliency
resilience
biblio
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT
Submitted by grigby1 on Fri, 05/20/2022 - 4:33pm
Compositionality
theoretical cryptography
secure matrix operations
secure IoT
privacy preserving algorithms
Post-quantum cryptography
Health
support vector machine classification
Industrial Informatics
classification
deep learning
Cybersecurity
Classification algorithms
composability
quantum computing
Cryptography
privacy
pubcrawl
machine learning
machine learning algorithms
biblio
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
pubcrawl
Hardware Security
quantum computing
Quantum mechanics
composability
side-channel attacks
Compositionality
Resistance
Power measurement
digital signature
Transforms
standardization
correlation power analysis
number theoretic transform
Post-quantum cryptography
theoretical cryptography
biblio
Graph-Based Lattices Cryptosystem As New Technique Of Post-Quantum Cryptography
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
Cryptography
pubcrawl
quantum computing
composability
encoding
Compositionality
NP-hard problem
Lattices
lattice
degree sequence
graphic lattice
Graphics
ice-flower system
sufficient conditions
topological coding
theoretical cryptography
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »