Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure hash algorithm
biblio
Analysis of GPGPU-Based Brute-Force and Dictionary Attack on SHA-1 Password Hash
Submitted by grigby1 on Fri, 09/04/2020 - 2:36pm
general-purpose computing on graphics processing unit
brute force attacks
word-list
SHA-1 password hash
SHA-1
secure hash algorithm
password hash
mask-attack
hashed password data
GPGPU-based cracking
GPGPU-based brute-force attack
Cryptography
dictionary attack
brute-force
authentication data
policy-based governance
Human Factors
pubcrawl
encrypted file
message authentication
file organisation
authorisation
biblio
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations
Submitted by grigby1 on Fri, 08/28/2020 - 2:33pm
Metrics
storage management
standards
Shamir secret sharing algorithm
security property
security
secured distributed Big Data
secure hash algorithm
Scalability
retrieving phase
Resiliency
resilience
pubcrawl
authenticity properties
encryption
dividing phase
distribution phase
distributed storage locations
Distributed databases
Cryptography
cloud location
Cloud Computing
Big Data storage scheme
big data security in the cloud
Big Data
authorizations
biblio
Anonymous Privacy-Preserving Scheme for Big Data Over the Cloud
Submitted by aekwall on Mon, 08/24/2020 - 12:51pm
MapReduce
big data privacy
secure hash algorithm
network operating systems
MapReduce framework
data decryption
anonymous privacy-preserving scheme
Hadoop distributed file system
Human Factors
cloud
Proposals
parallel processing
security
Metrics
privacy
pubcrawl
Resiliency
data encryption
data privacy
Big Data
encryption
Cryptography
Scalability
Cloud Computing
biblio
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
hash
hash algorithms
SHA-2 hash functions
security analysis scheme
secure hash algorithm
randomness analyses
randomness
output hash
odd ratio tests
modified SHA
Merkle Damgård structure
high performance computing testbed
hash output
Cryptography
generated hash
famous secure hash algorithms SHA-1
CUDA parallel computing platform
corresponding hash function
Bayesian tests
Bayesian
SHA-1
Compositionality
parallel processing
pubcrawl
Resiliency
biblio
Ensuring Cloud Data Security Using Public Auditing with Privacy Preserving
Submitted by grigby1 on Mon, 08/05/2019 - 10:30am
encryption audits
windows server instance
third party auditor
storage management
Servers
security issues
secure hash algorithm
secure auditing system
Resiliency
resilience
public auditing
pubcrawl
privacy preserving
Metrics
metadata
advanced encryption standard algorithm
encryption
data storing
data privacy
data integrity
data confidentiality
Cryptography
Compositionality
cloud service providers
cloud data security
cloud data
Cloud Computing
auditing
Amazon EC2 cloud
biblio
Digital signature using MAC address based AES-128 and SHA-2 256-bit
Submitted by grigby1 on Wed, 05/16/2018 - 12:48pm
MAC address
word length 256 bit
telecommunication security
standards
SHA-2 256 bit
Seminars
secure hash algorithm
Resiliency
resilience
Repudiation
pubcrawl
Metrics
advanced encryption standard
human factor
Human behavior
encryption
digital signatures
digital signature
digital messaging
Cryptography
computer science
composability
AES-128
biblio
On the implementation of mceliece with CCA2 indeterminacy by SHA-3
Submitted by BrandonB on Wed, 05/06/2015 - 10:50am
McEliece algorithm
Vectors
SHA-3 module
SHA-3
secure hash algorithm
public-key
public key cryptography
post-quantum public-key algorithm
Post-quantum cryptography
Algorithm design and analysis
McEliece
Keccak
encryption
computer architecture
Clocks
CCA2 security standard
CCA2 indeterminacy
CCA2
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 10:49am
injection-based fault simulations
Transient analysis
step-forward toward
SHA-3 algorithm
security
secure hash algorithm (SHA)-3
secure hash algorithm
rotated operand-based scheme
robust hardware implementations
Reliability
pseudorandom number generation
performance overheads
parallel processing
low-complexity recomputing
Keccak
integrity checking
acceptable complexity
high-performance concurrent error detection scheme
high performance
hashing
hardware overhead reduction
Hardware
error detection
error coverage
Cryptography
concurrency control
computational complexity
Circuit faults
ASIC analysis
Application-specific integrated circuit (ASIC)
application specific integrated circuits
Algorithm design and analysis