Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
elliptic curve
biblio
An Implementation and Evaluation of a Pairing on Elliptic Curves with Embedding Degree 14
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
exponentiation
pseudo7-sparse algorithm
pairing-based cryptography
multiplication algorithm bases
multiple devices
generation cryptography
Finite filed arithmetic
efficient curves
computer architecture technology
advanced cryptography
Approximation algorithms
Scalability
elliptic curve
Elliptic curves
Elliptic curve cryptography
public key cryptography
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
encryption
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
digital signatures
secure cloud data communication
Receivers
Quantum Key Distribution
quantum computing
public key cryptography
malicious client
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature
elliptic curve
Elliptic curve cryptography
data exchange
Cryptographic Protocols
Cloud Computing
BB84
authentication
Metrics
Resiliency
Scalability
pubcrawl
biblio
Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line
Submitted by aekwall on Mon, 01/25/2021 - 12:59pm
password
High-speed
corporate network
Asymmetric Encryption
elliptic curve
Ciphers
PLC
Elliptic curves
Public key
Servers
Metrics
Cryptography
composability
pubcrawl
Human behavior
Resiliency
Protocols
encryption
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
mobile ad hoc networks
manet privacy
secure identity-based deniable authentication protocol
identity-based cryptosystem
identity-based cryptography
IBDA protocol
heavy computational communication overhead
Deniable authentication
Bilinear Pairing
adequate security
mobile nodes
Compositionality
mobile devices
elliptic curve
mobile ad hoc network
mobile computing
Cryptography
MANET
Elliptic curves
Elliptic curve cryptography
public key cryptography
mobile radio
Ad hoc networks
message authentication
authentication
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
biblio
Elliptic curve and Lattice cryptosystem
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
lattice
Vectors
square matrices
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
matrix algebra
Lattices
lattice-based cryptography
lattice cryptosystem
closest vector problem
Homomorphic encryption
finite local ring
encryption
Elliptic curves
Elliptic curve over a ring
Elliptic curve cryptography
elliptic curve
discrete logarithm
digital signatures
Diffie-Hellman
cryptography method
conjugate problem
biblio
Efficient Implementation of Cryptography on Points of an Elliptic Curve in Residue Number System
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Metrics
weighted number system
Scalability
RNS
Resiliency
resilience
residue number systems
residue number system
public key cryptography
pubcrawl
Modular Multiplication
adding points
Mathematical model
Jacobian matrices
Galois fields
Elliptic curves
Elliptic curve cryptography
elliptic curve
doubling points
Cryptography
computational complexity
arithmetic operations
biblio
A variant of the Schnorr signature using an elliptic curve over a field of characteristic two
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
pubcrawl
standards
software engineering
Schnorr signature scheme
Schnorr signature
scalar multiplication
Scalability
Resiliency
public key cryptography
authentication
koblitz Curve
Elliptic curves
elliptic curve
double-and-add scalar multiplication
digital signatures
digital signature
computer science
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
linear codes
theoretical cryptography
structural attacks
strong mathematical background
side-channel attacks
public-key cryptosystem
public-key cryptography
post-quantum standardization
Post-quantum cryptography
polynomials
polynomial time
oldest quantum-resistant proposition
number theory problems
number theory
NIST's announcement
McEliece scheme
pubcrawl
elliptic curve
discrete logarithm
coding theory
code-based cryptography
adequate post-quantum cryptographic schemes
quantum cryptography
side-channel analysis
public key cryptography
quantum computer
Decoding
Computers
Compositionality
physical attacks
encryption
composability
« first
‹ previous
1
2
3
next ›
last »