Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum computing
biblio
Quantum Cryptography on IBM QX
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
quantum key distribution protocol
pubcrawl
quantum
quantum bit commitment
quantum computation
quantum computers
quantum computing security
quantum computing
quantum cryptography
Quantum Key Distribution
Protocols
quantum machines
quantum protocols
Qubit
Resiliency
Scalability
security shifts
statistical analysis
telecommunication security
theoretical cryptography
distributed keys
BB84 protocol
BB84 theoretical expected results
classical computers
composability
Compositionality
computational power
Cryptographic Protocols
cryptographic solutions
Cryptography
BB84
electronic transactions
encoding functions
existing classical algorithms 100% breakable
IBM QX software
intended parties
Logic gates
mathematical complexity
practical implementation results
Predictive Metrics
biblio
Optimizing Quantum Circuits for Modular Exponentiation
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
pubcrawl
verilog implementation
tools
scalable synthesis methods
Scalability
reversible modular exponentiation function
Resiliency
Qubit
Quantum error correction
Quantum Error Correcting Codes (QECC)
quantum computing
quantum computers
quantum circuits
quantum architectures
Quantum Algorithm(QA)
computer architecture
modular exponentiation functions
modular exponentiation
Logic gates
logic designs
logic design
logic circuits
linear nearest neighbor property
Linear Nearest Neighbor (LNN)
Hardware design languages
hardware description languages
exponentiation functions
exponentiation
error correction
biblio
Adoption of Lamport signature scheme to implement digital signatures in IoT
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
embedded systems
Lamport signature scheme
Internet of Things technology
digital communication
quantum computing
Public key
digital signatures
Generators
firmware
computer network security
authentication
Companies
pubcrawl
Resiliency
IoT devices
Internet of Things
Cryptography
Scalability
biblio
Single Trace Side Channel Analysis on Quantum Key Distribution
Submitted by grigby1 on Tue, 10/08/2019 - 4:45pm
Resiliency
quantum computer
quantum computing
quantum cryptography
Quantum Key Distribution
quantum physics
quantum properties
random key generation
random number generation
resilience
QKD system
Scalability
Secret key
Side-channel attack
side-channel attacks
single electromagnetic trace
Single Trace Attack
single trace side channel analysis
stable key generation
weak random number generators
Phase modulation
Cryptographic Protocols
Diffie-Hellman key exchange
Electromagnetics
EM analysis
Human behavior
key exchange protocols
Metrics
number theoretic problems
number theory
BB84 protocol
phase modulator
Photonics
plug-and-play
plug-and-play QKD system
private key cryptography
Protocols
pubcrawl
QKD
biblio
A Study on the Use of Quantum Computers, Risk Assessment and Security Problems
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
Resiliency
quantum approaches
quantum computer
quantum computers
quantum computing
quantum computing security
Quantum mechanics
quantum physics
resilience
pubcrawl
risk assessment
Scalability
security
security problems
simultaneous operation
threat
wide solution space
high-resolution image
computational complexity
computer based solutions
Computers
Cryptography
cryptosystems
encryption
high complexity value
high performance
composability
information storage
internet
large-scale data processing
long processing times
Metrics
optimisation
optimization problems
biblio
Genetic Algorithm to Study Practical Quantum Adversaries
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
composability
genetic algorithm
Metrics
pubcrawl
quantum computing
quantum computing security
quantum cryptography
resilience
Resiliency
Scalability
biblio
SIMULATION OF QUANTUM ENCODER DECODER WITH FLIP BIT ERROR CORRECTION USING REVERSIBLE QUANTUM GATES
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
QEC
security
Scalability
reversible quantum gates
Resiliency
resilience
Quantum technology
quantum noise
quantum information
quantum gates
Quantum error correction
quantum encoder & decoder
quantum cryptography
quantum computing security
quantum computing
Quantum circuit
composability
QCAD
pubcrawl
Metrics
Logic gates
logic circuits
Integrated circuit modeling
flip bit error correction
faulty quantum gates
fault-tolerant quantum computation
error correction codes
error correction
Decoding
Computational modeling
computation process
biblio
Quantum IoT: A Quantum Approach in IoT Security Maintenance
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
quantum mechanics laws
pubcrawl
Quantum approach
quantum channel
quantum communication
quantum computing
quantum computing security
quantum cryptography
quantum cryptography BB84 protocol
Quantum IoT
Protocols
quantum state
Qubit
resilience
Resiliency
Scalability
security of data
Security Processing Security
telecommunication security
greater security design
classical communication
Cloud Computing
complex management
composability
Cryptographic Protocols
data dynamics
data generation process
data storage
BB84 protocol
hybrid management
Internet of Things
IoT security infrastructure
IoT security maintenance
Metrics
One Pad Cryptography
Predictive Metrics
privacy
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »