Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
shift registers
biblio
Hardware IP Protection Using Logic Encryption and Watermarking
Submitted by grigby1 on Wed, 08/11/2021 - 3:27pm
Logic gates
encryption
pubcrawl
policy-based governance
collaboration
resilience
Resiliency
Integrated circuit modeling
composability
Foundries
Watermarking
ip protection
reverse engineering
shift registers
biblio
Whitenoise encryption implementation with increased robustness to side-channel attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
design techniques
white box cryptography
whitenoise encryption algorithm implementation
White noise
static power consumption
shift registers
quadratic cost
power analysis attacks
linear cost
Hamming distance
dynamic power consumption
Cryptography
side-channel attacks
Power demand
pubcrawl
Heuristic algorithms
Robustness
Metrics
composability
Resiliency
encryption
biblio
Hardware Trojans Detection at Register Transfer Level Based on Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:37pm
Libraries
Trojan horses
trojan horse detection
training database
Training
supply chain security
source code (software)
shift registers
server-client mechanism
RTL source codes
Resiliency
resilience
register transfer level
pubcrawl
machine-learning-based detection method
circuit features extraction
learning (artificial intelligence)
invasive software
integrated circuits design process
Integrated circuit modeling
integrated circuit design
Hardware Trojans library
Hardware Trojans detection
Hardware
flip-flops
feature extraction
electronic engineering computing
database management systems
cyber physical systems
biblio
Image Steganography Based on Hybrid Edge Detector to Hide Encrypted Image Using Vernam Algorithm
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
LSB method
word length 64800.0 bit
word length 3.0 bit
word length 2.0 bit
Vernam cipher algorithm
Vernam algorithm
steganography detection
Steganography
shift registers
secret image bits
pubcrawl
pseudorandom key
privacy
NonLinear Feedback Shift Register
multimedia technology
Metrics
and edge detector
least significant bit steganography
internet technology
information security
Image Steganography
Hybrid Sobel edge detector
hybrid Kirch edge detector
hiding image
Geffe generator
encrypted image
edge pixel
edge detection
data encapsulation
Cryptography
composability
baboon cover image
biblio
A DNA-Sticker Algorithm for Cryptanalysis LFSRs and NLFSRs Based Stream Cipher
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
linear feedback shift register based stream cipher
decision technique
DNA computing
DNA Cryptanalysis
DNA molecules
DNA sticker model based algorithm
DNA-based algorithm
Electron tubes
genetic bases
key stream bit
LFSR
LFSRs equation
cryptographic systems
molecular biophysics
molecular computing
NLFSR
NLFSRs
nonlinear feedback shift register based stream cipher
parallel computations
parallel search
shift registers
Sticker-Model
TEST TUBE
feedback
Computational modeling
resilience
pubcrawl
Human behavior
Metrics
Cryptography
cryptanalysis
search problems
Ciphers
DNA
privacy
Resiliency
stream cipher
biocomputing
biological operations
Adelman's DNA computing experiment
algebra
algebraic code
bit string
cipher characters
computability model
biblio
Research of a reconfigurable coarse-grained cryptographic processing unit based on different operation similar structure
Submitted by grigby1 on Wed, 02/21/2018 - 1:45pm
pubcrawl
logic synthesis
M/DLFSR
Metrics
multiply/divide linear feedback shift register
Policy
Policy-Governed Secure Collaboration
power aware computing
power consumption saving
logic design
Reconfigurable
reconfigurable architectures
reconfigurable coarse-grained cryptographic processing unit
resilience
Resiliency
Scalability
shift registers
size 55.0 nm
Different Operations Similar Structure
Algorithm design and analysis
arrays
Ciphers
coarse-grained reconfigurable cryptologic array
collaboration
composability
Cryptography
cryptology
55nm CMOS standard-cell library
different operations similar structure reconfigurable design
feedback
feedback shift register structure
finite Field GF(2n)
Galois fields
Human behavior
human factor
Linear feedback shift registers
biblio
Implementation and optimization of A5-1 algorithm on coarse-grained reconfigurable cryptographic logic array
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
resource allocation
Microelectronic Security
Noise measurement
performance optimization
pubcrawl
real-time requirements
reconfigurable architectures
resilience
Resiliency
Metrics
resource consumption
resource-based path seeking algorithm
RPS adaptive algorithm
shift registers
stream cipher
telecommunication security
Throughput
voice data encryption
coarse-grained reconfigurable cryptographic logic array
A5-1 algorithm optimization
Algorithm design and analysis
application specific integrated circuits
ASIC
bit rate 162.87 Mbit/s
cellular radio
CGRCA
Ciphers
A5-1
composability
Conferences
Cryptography
field programmable gate arrays
FPGA
frequency 162.87 MHz
GSM
biblio
Chaos-based video steganography
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Metrics
video coding
Tinkerbell 2D chaotic map
Tinkerbell
Steganography
shift registers
Resiliency
randomized data hiding points
pubcrawl
PSNR
NonLinear Feedback Shift Register
nonlinear dynamics physics
NLFSR
Mutual information
chaos
information technology
Image Steganography
Image color analysis
frame embedding position
data hiding limit
data hiding
Cryptography
composability
chaotic map
chaotic cryptography
chaotic communication
chaos-based video steganography mechanism
biblio
Real-time trust evaluation in integrated circuits
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
power-gating techniques
Trojan-infected variants
Trojan-free variants
Trojan horses
testing
statistical analysis
side-channel measurements
side-channel fingerprinting detection
shift registers
Semiconductor device measurement
reconfigurable linear feedback shift register array
real-time trust evaluation framework
advanced design skills
Power measurement
Power demand
post-fabrication trust evaluation methods
on-board global power consumption
LFSR array
invasive software
integrated circuits
hardware Trojan detection
Hardware
Erbium
chip trustworthiness