Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
side-channel attacks
biblio
A Randomized Montgomery Powering Ladder Exponentiation for Side-Channel Attack Resilient RSA and Leakage Assessment
Submitted by grigby1 on Wed, 07/13/2022 - 12:11pm
exponentiation
Masking through Randomization of Computations
Montgomery Powering Ladder
multiprotocol label switching
pubcrawl
resilience
Resiliency
Resistance
Scalability
Side Channel Leakage assessment and analysis
Side Channel Resilient RSA
side-channel attacks
timing
Very large scale integration
biblio
Generating Residue Number System Bases
Submitted by grigby1 on Tue, 07/12/2022 - 2:23pm
collaboration
pubcrawl
resilience
Resiliency
Filtering
composability
side-channel attacks
Metrics
Compositionality
Scalability
digital arithmetic
cryptology
policy governance
residue number systems
biblio
A Random Selection Based Substitution-box Structure Dataset for Cryptology Applications
Submitted by grigby1 on Tue, 07/12/2022 - 2:22pm
side-channel attacks
substitution box
random selection
policy governance
cryptology
Resistance
chaos
Compositionality
Metrics
Ciphers
composability
Block Cipher
Generators
Conferences
Resiliency
resilience
pubcrawl
collaboration
biblio
A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks
Submitted by grigby1 on Tue, 05/24/2022 - 12:50pm
Switches
voltage regulator
trng
side channel attacks
power analysis
Regulators
Voltage control
Metals
Resistance
Compositionality
Metrics
Internet of Things
side-channel attacks
composability
Information Assurance
AES
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
Submitted by grigby1 on Fri, 05/20/2022 - 3:31pm
pubcrawl
Hardware Security
quantum computing
Quantum mechanics
composability
side-channel attacks
Compositionality
Resistance
Power measurement
digital signature
Transforms
standardization
correlation power analysis
number theoretic transform
Post-quantum cryptography
theoretical cryptography
biblio
Secure Allocation for Graph-Based Virtual Machines in Cloud Environments
Submitted by grigby1 on Thu, 05/12/2022 - 9:49am
virtualization privacy
Cloud Computing
composability
Cryptography
cyber physical systems
data centers
data privacy
machine learning
pubcrawl
resilience
Resiliency
side-channel attacks
Topology
virtual machine allocation
virtual machine security
Virtual machining
biblio
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure
Submitted by grigby1 on Tue, 03/22/2022 - 12:50pm
pubcrawl
user authentication
Smart Grids
smart grid security
Smart Grid
side-channel attacks
Scalability
Resiliency
resilience
ubiquitous computing
Protocols
Metrics
Internet of Things
edge computing
blockchain
authentication
security
biblio
RSGX: Defeating SGX Side Channel Attack with Return Oriented Programming
Submitted by grigby1 on Fri, 02/04/2022 - 1:49pm
programming
side-channel attacks
side channel attack
SGX
Semantics
Runtime
ROP
Return Oriented Programming (ROP)
return oriented programming
resilience
rop attacks
Loading
data privacy
Conferences
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
F-SGX: Next Generation SGX for Trusted Computing
Submitted by aekwall on Tue, 01/25/2022 - 2:51pm
Image Processing
Hardware
operating systems
Conferences
Trusted Computing
pubcrawl
Resiliency
Human behavior
composability
side-channel attacks
Computers
attestation
SGX
side channel attack
Trusting computing
biblio
Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning
Submitted by grigby1 on Mon, 01/10/2022 - 11:17am
Mobile Applications
Switches
side-channel attacks
Side-channel attack
Servers
Scalability
Resiliency
resilience
pubcrawl
permissions
operating systems
Mobile Security
android
Metrics
malware
machine learning
Human behavior
encryption
codes
Clipboard Jacking
Audio Jacking
Audio Distortion
android encryption
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »