Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
elliptic curve
biblio
Improvement of Final Exponentiation for a Pairing on FK12 Curve and its Implementation
Submitted by grigby1 on Tue, 07/18/2023 - 3:21pm
pubcrawl
resilience
Scalability
Cryptography
Protocols
Computers
Elliptic curves
Identity-based encryption
Resiliency
elliptic curve
Human Factors
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
biblio
Elliptic Curve Cryptography for Medical Image Security
Submitted by grigby1 on Fri, 07/14/2023 - 3:18pm
Ciphers
pubcrawl
Metrics
resilience
Resiliency
Cipher
Scalability
Cryptography
Runtime
Measurement
probability
Elliptic curve cryptography
Histograms
simulation
elliptic curve
medical images
biblio
Sustainability and Time Complexity Estimation of Сryptographic Algorithms Main Operations on Elliptic Curves
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
Time complexity
sustainability
Special Attacks
Order Of Elliptic Curve
Exponentiation Of Points
exponentiation
mathematical models
elliptic curve
Elliptic curves
information security
Scalability
Stability analysis
timing
resilience
Resistance
Resiliency
pubcrawl
biblio
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
pubcrawl
Resiliency
Cryptography
Elliptic curve cryptography
Resistance
resilience
Scalability
Poles and towers
Elliptic curves
Identity-based encryption
Costs
elliptic curve
exponentiation
pairing-based cryptography
special TNFS
biblio
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
pubcrawl
Resiliency
authentication
Cryptography
Protocols
Elliptic curve cryptography
resilience
Scalability
Elliptic curves
Identity-based encryption
elliptic curve
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
biblio
Conversion of the Diffie-Hellman Key Exchange Algorithm Based on Elliptic Curve Equations to Elliptic Curve Equations with Private Parameters
Submitted by grigby1 on Thu, 05/05/2022 - 2:20pm
information science
Scalability
Resiliency
resilience
pubcrawl
Program processors
parameter algebra
Metrics
key distribution algorithm
Communications technology
Elliptic curves
Elliptic curve cryptography
elliptic curve
discrete logarithm
Diffie-Hellman
Cryptography
composability
Complexity theory
biblio
Algebraic structure of parametric elliptic curves
Submitted by grigby1 on Thu, 05/05/2022 - 2:19pm
Elliptic curves
Scalability
Resistance
Resiliency
resilience
pubcrawl
parametric algebra
Metrics
information science
Communications technology
Elliptic curve cryptography
elliptic curve
discrete logarithm
Diffie-Hellman
Computers
composability
Complexity theory
biblio
A comparison of Differential Addition and Doubling in Binary Edwards Curves for Elliptic Curve Cryptography
Submitted by grigby1 on Thu, 05/05/2022 - 2:18pm
Market research
Software
security
Scalability
SageMath
Resiliency
resilience
pubcrawl
Protocols
Montgomery ladder
Metrics
benchmark
Indexes
Index Terms
Elliptic curves
Elliptic curve cryptography
elliptic curve
Differential Addition and Doubling
Cryptography
composability
Binary Edwards Curves
biblio
Design and Execution of Highly Adaptable Elliptic Curve Cryptographic Processor and Algorithm on FPGA using Verilog HDL
Submitted by grigby1 on Thu, 05/05/2022 - 2:18pm
Metrics
Verilog
Time-frequency Analysis
Scalability
Resiliency
resilience
Registers
pubcrawl
process control
composability
Memory management
Layout
Karatsuba
FPGA
Elliptic curves
Elliptic curve cryptography
elliptic curve
ECDSA
biblio
Elliptic Curve Parameters Optimization for Lightweight Cryptography in Mobile-Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 12:18pm
Ad Hoc Network Security
Ad hoc networks
Compositionality
delays
elliptic curve
Elliptic curve cryptography
lightweight cryptography
Memory management
Metrics
Mobile Ad-Hoc Networks (MANETs)
Power demand
pubcrawl
Resiliency
Routing
Routing protocols
1
2
3
next ›
last »