Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Name-Signature Lookup System: A Security Enhancement to Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:34pm
ip privacy
Hardware
Human behavior
man in the middle attack
named data networking
Network Interface Controller
privacy
Protocols
pubcrawl
resilience
Resiliency
Robustness
Scalability
security
Servers
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
Highly Area-Efficient Implementation of Modular Multiplication for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
koblitz Curve
Virtex-7 FPGA technology
Throughput
Table lookup
Scalability
Resiliency
Registers
public-key cryptosystem
Public Key Cryptography (PKC)
public key cryptography
pubcrawl
multiplying circuits
Metrics
LUT-FF pairs
logic design
256-bit modified interleaved modular multiplication
Interleaved Modular Multiplication (IMM)
IMM
hardware implementation design
Hardware Architecture (HA)
Hardware
flip-flops
field programmable gate arrays
Field Programmable Gate Array (FPGA)
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC operation
Cryptography
cryptographic operation
computer architecture
biblio
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
Submitted by grigby1 on Wed, 02/10/2021 - 12:52pm
potentially unintentional interactions
FPGA-to-FPGA
FPGAs
GPU-to-FPGA covert channels
hardware accelerators
highly-sensitive data
independent boards
Kintex 7 FPGA chips
local cloud FPGA
off-the-shelf Xilinx boards
per-user basis
potential countermeasures
FPGA security
Power Attacks
power supply unit leakage
Power supply units
receiving circuits
reconfigurable integrated circuits
Ring oscillators
sensing stressing ring oscillators
shared infrastructures
shared power supply units
sink FPGA
source FPGA
covert channels
pubcrawl
resilience
Resiliency
field programmable gate arrays
Hardware
Scalability
cloud environments
Compositionality
Voltage measurement
Transmitters
cryptographic keys
Cryptography
Field-Programmable Gate Arrays
Temperature measurement
Voltage control
Voltage regulators
APSULe
CPU-to-FPGA
cross-board leakage
cross-FPGA covert-channel attacks
data center infrastructure
different data center tenants
biblio
Design and Implementation of Full-Scale Industrial Control System Test Bed for Assessing Cyber-Security Defenses
Submitted by grigby1 on Wed, 02/03/2021 - 12:57pm
Industrial Control Systems
test beds
Scalability
Safety
Resiliency
resilience
pubcrawl
production environments
production engineering computing
Production
Local area networks
Integrated circuit modeling
computer network security
industrial control
ICS-specific security solutions
ICS test beds
Hardware
full-scale industrial control system test bed
Ethernet-based threat surface
cybersecurity defenses
cyber-security defenses
cyber security
control engineering computing
computer security
biblio
Independent credible: Secure communication architecture of Android devices based on TrustZone
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
Metrics
TrustZone
TEE
smart phones
security
Scalability
Resiliency
resilience
pubcrawl
android encryption
Human behavior
Hardware
encryption
ECDH
Cryptography
computer science
computer architecture
android
biblio
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
machine learning
Scalability
Root-of-trust
Resiliency
resilience
pubcrawl
Picture archiving and communication systems
physically unclonable functions
Metrics
machine learning-based attacks
machine learning-based adversary model
Adversary Models
logic locking
learning (artificial intelligence)
Human behavior
Hardware
Cryptography
cryptographic scheme
cryptanalysis attacks
Composed Hardware
Boolean functions
Approximation algorithms
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
integrated circuit
Tamarin prover
security protocols
Security Properties
Resiliency
resilience
pufs
PUF-based protocols
PUF API
pubcrawl
Protocols
physical unclonable functions
mutual authentication protocol
integrated circuits
Analytical models
hardware-based security
Hardware
formal methods and verification
fingerprint identification
error correction data
Data models
Cryptography
Cryptographic Protocols
Compositionality
application programming interface
APIs
API
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 11:35am
fuzzy set theory
Fuzzy Cryptography
symmetric cryptographic algorithms
suitable cryptographic algorithm
SHA256
fuzzy analytic hierarchy process
FAHP
experts grading method
ECDSA
asymmetric cryptographic algorithms
financial data processing
AES
cryptographic algorithms
security
cryptocurrencies
analytic hierarchy process
Distributed databases
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Hardware
data privacy
Computational efficiency
Scalability
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »