Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
NIST
biblio
True Random Number Generator (TRNG) for Secure Communications in the Era of IoT
Submitted by grigby1 on Tue, 08/31/2021 - 12:11pm
Cryptography
Entropy
Generators
Human behavior
Internet of Things
Metrics
NIST
Power demand
pubcrawl
random key generation
Reliability engineering
resilience
Resiliency
Scalability
biblio
Lightweight block ciphers for resource-constrained devices
Submitted by grigby1 on Wed, 08/18/2021 - 11:15am
NIST
wireless sensor networks
Signal processing algorithms
Scalability
Resiliency
resilience
radiofrequency identification
pubcrawl
performance evaluation
Algorithm
Market research
Lightweight Encryption
Lightweight Ciphers
IoT
Cryptography
Ciphers
Block Cipher
biblio
A Machine-Learning-Resistant 3D PUF with 8-layer Stacking Vertical RRAM and 0.014% Bit Error Rate Using In-Cell Stabilization Scheme for IoT Security Applications
Submitted by grigby1 on Tue, 08/03/2021 - 4:51pm
composability
Metrics
Microelectronics
NIST
pubcrawl
Reliability
resilience
Resiliency
security
Temperature measurement
testing
Three-dimensional displays
Tin
Training
biblio
Statistical Randomness Tests of Long Sequences by Dynamic Partitioning
Submitted by grigby1 on Tue, 05/25/2021 - 3:21pm
Metrics
test suites
Scalability
Resilient
resilience
randomness
Random variables
random number
pubcrawl
NIST SP 800-22
NIST
collaboration
Mathematics
information security
Indexes
Human Factors
Human behavior
Generators
cryptology
Cryptography
composability
biblio
An Empirical Analysis on the Usability and Security of Passwords
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
empirical analysis
phonemes
passwords
password-based authentication systems
password security
password creation strategies
Information Reuse and Security
Guidelines
Compositionality
password
security
security experts
message authentication
usability
Entropy
authentication
NIST
pubcrawl
Resiliency
authorisation
biblio
Attacking Key Management in Ransomware
Submitted by grigby1 on Wed, 03/17/2021 - 12:43pm
pubcrawl
targeted attacks
steady growth
Scalability
Resiliency
resilience
real-world ransomware
ransomware kill chain
Ransomware
public sector entities
public key cryptography
Public key
attacking key management
private sector entities
opportunistic attackers
NIST
memory attacks
invasive software
extracted keys
encryption
dynamically extracting decryption keys
concerning trends
Computer crime
Chained Attacks
biblio
Hardware Design of Polynomial Multiplication for Byte-Level Ring-LWE Based Cryptosystem
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
NIST PQC Standardization Process
BRAMs
byte-level modulus
byte-level ring-LWE based cryptosystem
computational time-consuming block
DSPs
high-level synthesis based hardware design methodology
ideal lattice
LAC
multiplication core
high level synthesis
polynomial multiplication
ring learning with error problem
ring LWE
time 4.3985 ns
time 5.052 ns
time 5.133 ns
Vivado HLS compiler
Xilinx Artix-7 family FPGA
NIST
Scalability
lattice-based cryptography
Cryptography
Hardware
Table lookup
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
field programmable gate arrays
post quantum cryptography
timing
polynomials
Software algorithms
Compositionality
program compilers
compiler security
logic design
biblio
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data
Submitted by grigby1 on Tue, 03/09/2021 - 3:04pm
resilience
multifactor
multimodal
NIST
NIST open source software
open-source software
password-driven methods
pubcrawl
public domain software
recognition
Metrics
Resiliency
Scalability
secure approaches
security
Software
test data
Unibiometric analysis
user authentication methods
cryptosystem
authorisation
Bio-metric
biometric algorithms
biometric authentication method
biometric data
biometrics (access control)
BIOS
Cryptography
authentication
fingerprint
Fingerprint recognition
fuzzy vault
Human behavior
Identification
internal open source utilities
Iris
Iris recognition
biblio
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
NIST
unpredictability properties
statistical testing
security strengths
secure hash function
Scalability
Resiliency
random number generation
random bit generator mechanism
Random Bit Generator
public key cryptography
pubcrawl
pseudorandom bit generators
pseudorandom bit generator mechanism
cryptographic hash functions
Metrics
Hash Function
hard number theoretic problems
Generators
encryption
Elliptic curves
elliptic curve discrete logarithm problem
Elliptic curve cryptography
Electronic mail
derivation function
decryption
cryptographic tasks
biblio
TMVP-Friendly Primes for Efficient Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:54pm
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
NIST
Elliptic curve cryptography
Elliptic curves
information security
Registers
Upper bound
Finite field multiplication
Montgomery curves
Toeplitz-matrix vector product
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »