Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum computing
biblio
Post-quantum message authentication cryptography based on error-correcting codes
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
error-correcting code based Cryptography
software implementation
Resiliency
Reed-Solomon codes
quantum computing
pubcrawl
post-quantum message authentication cryptography
Post-quantum cryptography
post-quantum code based signature
Metrics
error-correcting codes
composability
error correction codes
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
digital signatures
digital signature algorithm
digital signature
Cryptography
Computers
Computer simulation
biblio
Backchanneling Quantum Bit (Qubit) 'Shuffling': Quantum Bit (Qubit) 'Shuffling' as Added Security by Slipstreaming Q-Morse
Submitted by grigby1 on Fri, 11/03/2017 - 11:33am
random radicals
predicted-expected sender-receiver properties
pubcrawl
public key cryptography
Quantum bit (Qubit)
quantum computing
quantum cryptography
quantum cyphers
Quantum entanglement
Morse
Resiliency
Rivest-Shamir-Adleman
RSA
Scalability
sensors
Shuffling
slipstreaming Q-Morse code
containment wave
backchanneling qubit shuffling
Backchannelling
backchannelling quantum Morse code
blockchain ledger history
blockchain security
Ciphers
codes
communication security
backchanneling quantum bit shuffling
Cypher
digital signature algorithm
DSA
ECDSA
elliptic curve digital signature algorithm
Entanglement
Internet of Things
biblio
Group signature entanglement in e-voting system
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
group signature entanglement
security system
security of data
replay attack
Receivers
Qubit
Quantum entanglement
quantum computing
Protocols
politics
man-in-the-middle attack
authentication
Entanglement
entangled state
electronic voting
eavesdropping
e-voting system
digital signatures
database
cheating purposes
ballots
« first
‹ previous
…
2
3
4
5
6
7
8
9
10