Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum computing
biblio
Cryptography with information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
quantum computing
unconditionally secure schemes
trusted initializer model
power system security
long-term security
information theoretic security
Computer graphics
cryptosystems
digital signatures
information security
Scalability
information theory
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptography
biblio
Simulation of Modular Exponentiation Circuit for Shor's Algorithm in Qiskit
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
4-bit VBE quantum modular exponentiation circuit
x mod 15 circuit
step-by-step manner
Shor's Algorithm incorporating
RSA cryptosystems
quantum modular exponentiation circuit
quantum gates
Qiskit simulator
Qiskit
large-qubit quantum computer
integer factorization problem
example simulation
Ekert proposal
aforementioned circuit
Scalability
Quantum circuit
exponentiation
Qubit
adders
Registers
Integrated circuit modeling
Logic gates
quantum computing
public key cryptography
Computational modeling
pubcrawl
Resiliency
biblio
Surface Codes Based Quantum Networking
Submitted by grigby1 on Tue, 02/23/2021 - 2:37pm
arbitrary two nodes
surface codes
Repeaters
quantum optics
quantum networking
quantum communications networks
Quantum communications
QCN
Optical surface waves
optical fiber communication
multiple nodes
multipartite quantum communication network
Entanglement
quantum computing
arbitrary network topology
quantum communication
Lattices
network coding
composability
Quantum entanglement
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
digital signatures
secure cloud data communication
Receivers
Quantum Key Distribution
quantum computing
public key cryptography
malicious client
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature
elliptic curve
Elliptic curve cryptography
data exchange
Cryptographic Protocols
Cloud Computing
BB84
authentication
Metrics
Resiliency
Scalability
pubcrawl
biblio
A Quantum Concurrent Signature Scheme Based on the Quantum Finite Automata Signature Scheme
Submitted by aekwall on Mon, 02/08/2021 - 1:45pm
Quantum circuit
Scalability
Resiliency
quantum hash function
quantum finite automata signature scheme
Quantum entanglement
quantum digital signatures
quantum digital signature
quantum cryptography
quantum concurrent signature scheme
quantum concurrent signature
quantum computing security
quantum computing environment
quantum computing
public key cryptography
invertibility
Hash functions
finite automata
digital signatures
Cryptography
concurrent signatures scheme
complex quantum operations
automata
ambiguous signatures
pubcrawl
security
biblio
Quantum Homomorphic Encryption Based on Quantum Obfuscation
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
open question
telecommunication security
Scalability
Resiliency
Registers
Quantum point function
quantum obfuscation
Quantum mechanics
quantum homomorphic encryption scheme
Quantum homomorphic encryption
quantum computing security
quantum computation
public key cryptography
quantum computing
Metrics
Logic gates
Human Factors
Homomorphic encryption
encryption operator
encryption
encrypting party
encrypted data
decrypting party
data privacy
pubcrawl
security
biblio
Quantum-Sim: An Open-Source Co-Simulation Platform for Quantum Key Distribution-Based Smart Grid Communications
Submitted by grigby1 on Fri, 11/20/2020 - 2:04pm
orchestrates cyber
customer engagement
cyber-physical smart grid structures
demand response
electrical grids
grid modernization efforts
lowvoltage distribution grid
MITM attacks
open-source
optical fibre communication
optical fibre communications
communication efficiency
quantum key distribution protocols
quantum key distribution-based smart grid communications
quantum-based communication
quantum-based cyber-physical systems
quantum-Sim
realistic power flow-based co-simulation
research-oriented co-simulation platform
secure smart grid communications
smart grid consumer privacy
Protocols
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Scalability
Cryptography
privacy
smart power grids
quantum computing
quantum cryptography
composability
Smart Grids
power topologies
quantum communication
Open Source Software
communication technologies
biblio
IC/IP Piracy Assessment of Reversible Logic
Submitted by aekwall on Mon, 11/09/2020 - 1:31pm
proper-size reversible functions
BDD
binary decision diagrams
embedded function
garbage outputs
IC-IP piracy assessment
IC/IP piracy
intellectual property piracy
Number of embeddings
ancillary inputs
QMDD
quantum multivalued decision diagrams
regular functions
Reversible logic
reversible logic circuits
reversible logic synthesis tools
IP piracy
IP networks
adiabatic computing
logic design
logic circuits
adders
Integrated circuit modeling
industrial property
Logic gates
quantum computing
Trojan horses
policy-based governance
composability
pubcrawl
Resiliency
embedded systems
security
biblio
Improved Veron Identification and Signature Schemes in the Rank Metric
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
probability
veron identification
Transforms
smallest signature
signature size
Security Metrics
secure signature scheme
rank metric
random oracle model
quantum cryptography
quantum computing
public key size
public key cryptography
pubcrawl
Protocols
cheating probability
Metrics
Measurement
linear codes
identification protocol
Fiat-Shamir transform
error-correcting codes
error correction codes
double circulant codes
digital signatures
Decoding
Cryptography
Computing Theory
code-based signature schemes
biblio
Optically Interrogated Unique Object with Simulation Attack Prevention
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
analogue measurement
confinement
UNO
unique photo-luminescence properties
unique object
simulation attacks
simulation attack protection
simulation attack prevention
simulation attack
semiconductor quantum dots
Quantum dots
Quantum Confinement UNO responds
physical object
photoluminescence
photoconductive cells
Nonlinear optics
security of data
absorption
light sources
Computer simulation
Adaptive optics
Cameras
resilience
quantum computing
cyber-physical systems
Entropy
privacy
Data protection
composability
pubcrawl
Resiliency
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »