Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
black box encryption
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
resilience
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
outsourcing
private key cryptography
pubcrawl
public key cryptography
public transformation key
Metrics
Resiliency
security model
selective security model
shorter bit length
standards
underlying ABE scheme
underlying standard ABE
ABE ciphertext
generic construction
generic approach
faster decryption time
encryption
efficient transformation key generation algorithm
concrete constructions
composability
Cloud Computing
black-box way
black box encryption
authorisation
attribute-based encryption
adaptive security
Adaptation models
ABE outsourcing schemes
biblio
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
full black-box security
user private key
user privacy security
user identity
user decryption
underlying TB-IBE scheme
token-based identity-based encryption
Resiliency
resilience
pubcrawl
private key cryptography
Metrics
malicious private key generator
Identity-based encryption
generic construction
A-IBE scheme
encryption
dummy identity-based encryption
Decoding
decoder box
data privacy
computational complexity
composability
ciphertexts
black-box security
black box encryption
authority identity-based encryption
authorisation
attribute-based encryption
Accountable authority
biblio
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM
Submitted by aekwall on Mon, 03/18/2019 - 9:53am
key sizes
black box encryption
quantum random oracle models
quantum cryptography
quantum computing
public key cryptography
Public key
postquantum security
post-quantum cryptographic schemes
post-quantum cryptographic primitives
post quantum cryptography
module lattices
Learning with errors
Lattices
key-establishment protocols
key-encapsulation mechanism
digital signature
key encapsulation
CRYSTALS - Kyber
CPA-secure public-key encryption scheme
ciphertext sizes
CCA-secure module-lattice-based KEM
CCA-secure KEM
authenticated-key-exchange schemes
Metrics
composability
pubcrawl
Resiliency
Electronic mail
Protocols
Cryptographic Protocols
encryption
biblio
Quantum Grover Attack on the Simplified-AES
Submitted by aekwall on Mon, 03/18/2019 - 9:53am
quantum computing security
black box encryption
Block Cipher
composability
Grover attack
Metrics
pubcrawl
Quantum cryptanalysis
Quantum simulation
Resiliency
symmetric cryptography
biblio
Securing Wireless Neurostimulators
Submitted by aekwall on Mon, 03/18/2019 - 9:52am
random key generation
black box encryption
black-box reverse engineering
composability
low-cost randomness source
Metrics
proprietary wireless communication protocol
pubcrawl
Resiliency
security architecture
biblio
Cliptography: Post-Snowden Cryptography
Submitted by grigby1 on Mon, 03/05/2018 - 1:05pm
backdoor resistance
black box encryption
cliptography
composability
Cryptography
implementation subversion
kleptography
Metrics
pubcrawl
resilience
Resiliency
Steganography
biblio
Spinner: Semi-Automatic Detection of Pinning Without Hostname Verification
Submitted by grigby1 on Mon, 03/05/2018 - 1:05pm
black box encryption
composability
Metrics
pubcrawl
resilience
Resiliency
biblio
Generic Semantic Security Against a Kleptographic Adversary
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
random key generation
black box encryption
composability
kleptography
Metrics
pke
pubcrawl
resilience
Resiliency
semantic security
biblio
Time-Based One-Time Password for Wi-Fi Authentication and Security
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
pubcrawl
wireless networks
wireless LAN
Wireless fidelity
WiFi Security
Wi-Fi network security
Time-based One-Time Password (TOTP)
time-based one-time password
SSID
Service Set Identifier (SSID)
security infrastructure
Resiliency
resilience
authentication
Protocols
periodic secure passwords
Metrics
Internet of Things (IoT)
internet
encryption
Dictionaries
computer network security
composability
completely automated Wi-Fi authentication system
black box encryption
authorisation
biblio
A Practical Quantum Public-Key Encryption Model
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
public key cryptography
secret keys
Resiliency
resilience
quantum trapdoor one-way function
quantum public-key encryption model
quantum public key encryption model
Quantum mechanics
quantum information security
quantum cryptography
quantum computing
black box encryption
Public key
pubcrawl
Metrics
encryption
decryption process
Computational modeling
computational indistinguishability
composability
blackbox client-side
« first
‹ previous
1
2
3
4
5
next ›
last »