Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
error detection
biblio
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement
Submitted by grigby1 on Fri, 08/18/2017 - 1:11pm
authentication
composability
cover image
error detection
Metrics
privacy
pubcrawl
repairing
secret image
secret sharing
Steganography
steganography detection
biblio
"IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles"
Submitted by grigby1 on Thu, 02/23/2017 - 1:27pm
fault tolerance
Very large scale integration
security
pubcrawl170106
nanotechnology
mechanical engineering computing
masquerade attack
IntelliCAN
Hardware Security
Fault tolerant systems
attack-resilient controller area network
error detection
Discrete Fourier transforms
controller area networks
controller area network(CAN)
computer network security
CAN protocols
automobiles
automobile
biblio
"Fault Detection and Correction in Processing AES Encryption Algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 12:52pm
production faults
fault diagnosis
fault injection attack
fault-tolerance technique design
field programmable gate arrays
FPGA technology
Hardware
linear mappings
MC transformation
MixColumn transformation
noise effects
fault detection technique
pubcrawl170102
radiation effect
ShiftRow transformation
side-channel attacks
Single event upsets
SR transformation
system reliability improvement
system security improvement
temporary redundant check words
encryption
AES cipher
AES encryption algorithm
AES Encryption process
AES linear mappings and error correcting codes
AES round structure
Ciphers
Cryptography
cryptosystem
ECC properties
advanced encryption standard
error control mechanisms
error correction
error detection
error syndrome
Execution errors and countermeasure against fault injection side channel attacks
fault correction technique
fault coverage
fault detection
Fault detection and correction
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 10:49am
injection-based fault simulations
Transient analysis
step-forward toward
SHA-3 algorithm
security
secure hash algorithm (SHA)-3
secure hash algorithm
rotated operand-based scheme
robust hardware implementations
Reliability
pseudorandom number generation
performance overheads
parallel processing
low-complexity recomputing
Keccak
integrity checking
acceptable complexity
high-performance concurrent error detection scheme
high performance
hashing
hardware overhead reduction
Hardware
error detection
error coverage
Cryptography
concurrency control
computational complexity
Circuit faults
ASIC analysis
Application-specific integrated circuit (ASIC)
application specific integrated circuits
Algorithm design and analysis
« first
‹ previous
1
2