Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
randomness
biblio
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
key generation
encryption system
Dynamic Key
random key generation
Resiliency
Iris
biometrics
randomness
Image color analysis
Mathematics
encryption
resilience
NIST
authentication
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
Cloud Computing
biblio
Statistical Randomness Tests of Long Sequences by Dynamic Partitioning
Submitted by grigby1 on Tue, 05/25/2021 - 3:21pm
Metrics
test suites
Scalability
Resilient
resilience
randomness
Random variables
random number
pubcrawl
NIST SP 800-22
NIST
collaboration
Mathematics
information security
Indexes
Human Factors
Human behavior
Generators
cryptology
Cryptography
composability
biblio
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs
Submitted by grigby1 on Fri, 11/20/2020 - 1:54pm
Jitter
Stochastic Computing Security
worst-case entropy estimation
unpredictable random numbers
thermal noise
Stochastic processes
specific conditional Shannon entropy
RO-based entropy sources
ring oscillator-based entropy sources
Ring Oscillator
randomness
Oscillators
oscillator-based entropy sources
Cryptography
History
estimation
entropy source
entropy evaluation
Entropy
cryptographic system
average conditional Shannon entropy
Scalability
Resiliency
resilience
pubcrawl
security
biblio
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
pseudo-random number generator (PRNG)
discrete-time chaotic maps
dynamics degradation
fixed point arithmetic
fixed-point arithmetic
floating point arithmetic
floating-point arithmetic
logistic map
Orbits
digital computer
pseudorandom number generators
Quantization (signal)
random number generation
randomness
SMN
state-mapping network
tent map
black box encryption
encryption
complex network
telecommunication security
Generators
pubcrawl
composability
Metrics
Resiliency
resilience
Cryptography
chaos
Degradation
chaotic communication
Logistics
black box
chaotic dynamics
chaotic map
communication securiy
biblio
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
hash
hash algorithms
SHA-2 hash functions
security analysis scheme
secure hash algorithm
randomness analyses
randomness
output hash
odd ratio tests
modified SHA
Merkle Damgård structure
high performance computing testbed
hash output
Cryptography
generated hash
famous secure hash algorithms SHA-1
CUDA parallel computing platform
corresponding hash function
Bayesian tests
Bayesian
SHA-1
Compositionality
parallel processing
pubcrawl
Resiliency
biblio
Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations
Submitted by grigby1 on Tue, 01/07/2020 - 10:50am
Metrics
encryption
Generators
Hadamard matrices
Hadamard matrix
Human behavior
internet
Knight Tour
Knight tour movement
dynamic key generation
privacy
pubcrawl
random DNA sequence
randomness
resilience
Resiliency
secret data transformation
attack operations
DNA reference nucleotides locations
DNA Gen Bank reference
DNA encryption technique
DNA encryption algorithm
DNA cryptography
DNA arithmetic
DNA
deoxyribonucleic acid
Cryptography
Ciphers
Blum Blum Shub generator
biological operations
bioinformatics
BBS-DNA sequence
BBS generator
biblio
Enhanced pseudorandom number generator based on Blum-Blum-Shub and elliptic curves
Submitted by aekwall on Wed, 05/01/2019 - 12:37pm
Metrics
Urban areas
statistical testing
squaring operation
Scalability
Resiliency
randomness tests
randomness
random processes
random number generation
public key cryptography
pubcrawl
pseudorandom number generator
NIST statistical test suite
BBS-ECPRNG approach
Mathematical model
Generators
Galois fields
enhanced pseudorandom number generator
Elliptic curves
elliptic curve points
elliptic curve point operations
Elliptic curve cryptography
Curve fitting
cryptographically secure bits
complex pseudorandom number generator
Blum-Blum-Shub
biblio
Risk-based DC security assessment for future DC-independent system operator
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk-based static security assessment methodology
Probabilistic logic
probability
pubcrawl170107
pubcrawl170108
randomness
Risk
risk assessment tools
risk-based DC security assessment
probabilistic approach
security
security assessment
uncertainty
Voltage control
wind power
wind power plants
wind speed variability
HVDC transmission
DC-independent system operator
DC-ISO
Fuzy
fuzzy inference system
fuzzy reasoning
fuzzy set theory
HVDC
HVDC power transmission
component risk
Indexes
Load flow
multiterminal HVDC
multiterminal HVDC system
offshore wind
power engineering computing
power system security