Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Keccak
biblio
Sponge based Lightweight Cryptographic Hash Functions for IoT Applications
Submitted by grigby1 on Thu, 06/09/2022 - 1:38pm
Resiliency
SPONGENT
sponge construction
QUARK
PHOTON
Lightweight Hash
Keccak
HASH-ONE
GLUON
Internet of Things
Photonics
hash algorithms
Cryptographic Hash Function
Compositionality
batteries
resilience
pubcrawl
biblio
Securing the Integrity of PDF Files using RSA Digital Signature and SHA-3 Hash Function
Submitted by aekwall on Fri, 02/04/2022 - 9:30am
verification
Repudiation
Signing
SHA-3
RSA algorithm
Portable document format
non repudiation
Keccak
file integrity
digital signature
data science
Databases
Distance measurement
public key cryptography
Hash functions
Receivers
composability
Human behavior
Resiliency
Metrics
pubcrawl
authentication
biblio
DPA on Hardware Implementations of Ascon and Keyak
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Microelectronics Security
Ascon
composability
Differential Power Analysis
Hardware implementations
Keccak
Keyak
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
biblio
Concurrent Error Detection for Reliable SHA-3 Design
Submitted by grigby1 on Wed, 05/17/2017 - 12:54pm
composability
concurrency and security
concurrency security
Fault injection
Keccak
Metrics
pubcrawl
random errors
Reliability
Resiliency
SHA-3
biblio
HMAC based one t #x0131;me password generator
Submitted by BrandonB on Wed, 05/06/2015 - 10:51am
HMAC
standards
Signal processing algorithms
signal processing
Production
One Time Passwords
one time password production methods
one tıme password generator
message authentication
Keccak digest algorithm
Keccak
authentication
hashing-based message authentication code structure
Hash-Based Message Authentication Code
Hash functions
Hash Function
hash algorithm
fixed length strings
electronic media
Cryptography
Conferences
biblio
On the implementation of mceliece with CCA2 indeterminacy by SHA-3
Submitted by BrandonB on Wed, 05/06/2015 - 10:50am
McEliece algorithm
Vectors
SHA-3 module
SHA-3
secure hash algorithm
public-key
public key cryptography
post-quantum public-key algorithm
Post-quantum cryptography
Algorithm design and analysis
McEliece
Keccak
encryption
computer architecture
Clocks
CCA2 security standard
CCA2 indeterminacy
CCA2
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 10:49am
injection-based fault simulations
Transient analysis
step-forward toward
SHA-3 algorithm
security
secure hash algorithm (SHA)-3
secure hash algorithm
rotated operand-based scheme
robust hardware implementations
Reliability
pseudorandom number generation
performance overheads
parallel processing
low-complexity recomputing
Keccak
integrity checking
acceptable complexity
high-performance concurrent error detection scheme
high performance
hashing
hardware overhead reduction
Hardware
error detection
error coverage
Cryptography
concurrency control
computational complexity
Circuit faults
ASIC analysis
Application-specific integrated circuit (ASIC)
application specific integrated circuits
Algorithm design and analysis