Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Galois fields
biblio
Enhanced pseudorandom number generator based on Blum-Blum-Shub and elliptic curves
Submitted by aekwall on Wed, 05/01/2019 - 12:37pm
Metrics
Urban areas
statistical testing
squaring operation
Scalability
Resiliency
randomness tests
randomness
random processes
random number generation
public key cryptography
pubcrawl
pseudorandom number generator
NIST statistical test suite
BBS-ECPRNG approach
Mathematical model
Generators
Galois fields
enhanced pseudorandom number generator
Elliptic curves
elliptic curve points
elliptic curve point operations
Elliptic curve cryptography
Curve fitting
cryptographically secure bits
complex pseudorandom number generator
Blum-Blum-Shub
biblio
A New Key Exchange Algorithm over a VLC Indoor Channel
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Neural Synchronization
VLC indoor channel
VLC
Visible Light Communications Security
visible light communication indoor channel
tree parity machine synchronization
Synchronization
synchronisation
stimulus vector
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
neuronal synchronization
average synchronization time t_sync
Metrics
key exchange algorithm
indoor communication
hyperelliptic curves
GF(2n)
Galois fields
Galois field
free-space optical communication
Diffie-Hellman protocol
DH-HEMTs
cryptosystem security
Cryptography
Cryptographic Protocols
Biological neural networks
biblio
Research of a reconfigurable coarse-grained cryptographic processing unit based on different operation similar structure
Submitted by grigby1 on Wed, 02/21/2018 - 1:45pm
pubcrawl
logic synthesis
M/DLFSR
Metrics
multiply/divide linear feedback shift register
Policy
Policy-Governed Secure Collaboration
power aware computing
power consumption saving
logic design
Reconfigurable
reconfigurable architectures
reconfigurable coarse-grained cryptographic processing unit
resilience
Resiliency
Scalability
shift registers
size 55.0 nm
Different Operations Similar Structure
Algorithm design and analysis
arrays
Ciphers
coarse-grained reconfigurable cryptologic array
collaboration
composability
Cryptography
cryptology
55nm CMOS standard-cell library
different operations similar structure reconfigurable design
feedback
feedback shift register structure
finite Field GF(2n)
Galois fields
Human behavior
human factor
Linear feedback shift registers
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
Radio frequency
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
matrix algebra
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
Algorithm design and analysis
key generation process
Human Factors
Human behavior
Galois fields
finite field
Ergodic Matrix
EPC code
encryption process
encryption
Databases
counterfeit
BMQE system
BMQ polynomials
bisectional multivariate quadratic equation system
anticounterfeit scheme
biblio
Research on the Underlying Method of Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
elliptic curve
Elliptic curve cryptography
Elliptic Curve Cryptosystem
Elliptic curves
finite field
Galois fields
generator
Generators
group
Metrics
pubcrawl
Receivers
Resiliency
Scalability
biblio
A compact and efficient architecture for elliptic curve cryptographic processor
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
heterogeneous function units
word length 576 bit
UMC
size 90 nm
scalar multiplication
Resiliency
Registers
public key cryptography
pubcrawl
parallel processing
Montgomery modular division algorithm
microprocessor chips
Metrics
Kaliski's Montgomery modular inversion
arbitrary curves
hardware complexity
Hardware
Galois fields
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
elliptic curve cryptographic processor
dual-field elliptic curve cryptographic processor
computer architecture
composability
CMOS integrated circuits
CMOS 1 P9M technology
clustering technology
Clustering algorithms
biblio
FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption
Submitted by grigby1 on Thu, 04/20/2017 - 12:40pm
secure data transmission
Inverse S-Box transformations
network on chip
network on chip security
network security algorithm
pre-calculated look-up tables
precalculated LUT
pubcrawl
Resiliency
Rijndael
Scalability
inverse mix-columns transformations
Table lookup
timing
Verilog-HDL
Virtex-7 XC7VX690T chip
wired digital communication networks
wireless digital communication networks
Xilinx ISE Design Suite-14.7 Tool
Xilinx Virtex-7 FPGA
Xilinx XPower Analyzer
decryption
AES-128
AES-192
AES-256
AES Rijndael algorithm
Algorithm design and analysis
algorithmic functions
Clocks
composability
Cryptography
advanced encryption standard (AES)
encryption
Field Programmable Gate Array (FPGA)
field programmable gate arrays
FPGA based hardware implementation
Galois field multiplications
Galois fields
GF (28)
Hardware Description Language (HDL)
hardware description languages
biblio
Provably Secure Group Key Management Approach Based upon Hyper-Sphere
Submitted by BrandonB on Wed, 05/06/2015 - 1:49pm
PRF
Vectors
security
secure group communication systems
robust group key management approach
re-keying messages
random number
public key cryptography
pseudorandom function assumption
pseudo-random function (PRF)
provably secure group key management approach
provable security
Protocols
private key cryptography
Algorithm design and analysis
member private point
massive membership change
key management
hyper-sphere theory
hyper-sphere
group controller
Group communication
GC
Galois fields
Educational institutions
Concrete
central point
biblio
On a Hashing-Based Enhancement of Source Separation Algorithms Over Finite Fields With Network Coding Perspectives
Submitted by BrandonB on Wed, 05/06/2015 - 11:48am
per-symbol encoding
multimedia transmission
network coding
network coding perspective
nonlinear codes
nonlinear encoding
nonlinear message digest
observed mixtures
overhead cost reduction
multimedia networking
relaying linear packet combination
scaling ambiguity
Source separation
source separation algorithm
source signal recovery
throughput maximization
Vectors
video coding
encoding
BSS
channel coding
classical entropy-based separation method
combination coefficient
compressed media sources
Context
Decoding
decoding rate
blind source separation
Entropy
finite fields
Galois fields
hashing-based enhancement
independent component analysis
loss immunity
mixing process
Multimedia communication
« first
‹ previous
1
2