Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Signature Generation
biblio
Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
time 0.0164 s
pubcrawl
public key cryptography
public key cryptosystems
Resiliency
RSA key generation
Scalability
Signature Generation
signature verification
time 0.001 s
time 0.002 s
time 0.004 s
post-quantum digital Signature algorithms
time 0.0187 s
time 0.0778 s
time 0.1378 s
time 0.2012 s
time 13.494 s
time 16.29 s
time 17.474 s
time 2.0E-4 s
verification time
W-OTS key generation
cryptographic systems security
security
bitcoin transaction security
Bitcoin transactions
classical algorithms
Comparative Analysis
Computer crime
Computers
creating digital signatures
cryptocurrencies
cryptocurrency
Cryptographic Protocols
bitcoin
Cryptography
current day algorithms
digital signatures
ECDSA key generation
Elliptic curves
encryption
Hash-based Signature Schemes
hash-based signatures
MSS Key generation
Post-quantum cryptography
biblio
Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Bitcoin cryptocurrency
Winternitz one-time signature scheme
stateful hash-based signature schemes
stateful hash-based digital signature schemes
signature verification
Signature Generation
Rivest Shamir Adleman
Post-quantum cryptography
Merkle signature scheme
Lamport one-time signature scheme
Hash-based Digital Signature
elliptic curve digital signature algorithm
discrete logarithm problems
Scalability
Bitcoim
Hash Function
quantum computers
cryptocurrency
security levels
quantum cryptography
quantum computing
digital signatures
cryptocurrencies
pubcrawl
Resiliency
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
A Survey on Zero-Day Polymorphic Worm Detection Techniques
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
payload encryption
zero-day polymorphic worm detection techniques
zero-day malware
Zero-day attacks
Vectors
signature-based defenses
Signature Generation
security layers
Polymorphic worms
Payloads
detection systems
Monitoring
malware
key per infection
invasive software
Internet security
internet
Grippers
Fingerprinting