Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
universal composability
biblio
Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases
Submitted by aekwall on Fri, 08/12/2022 - 3:53pm
Task Analysis
Protocols
Databases
Aggregates
computer security
pubcrawl
Writing
universal composability
Vector commitments
ZK proofs of knowledge
composability
biblio
R-Chain: A Universally Composable Relay Resilience Framework for Smart Grids
Submitted by aekwall on Fri, 08/12/2022 - 3:53pm
authentication
automation
composability
Cryptography
Key derivation
performance evaluation
Protocols
pubcrawl
Ransomware
relay resilience
Smart Grids
universal composability
biblio
Formalizing Constructive Cryptography using CryptHOL
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
Theorem Proving
composability
random systems
proof rules
information-theoretically secure channel
game-based proofs
CryptHOL
constructive cryptography
computer-aided cryptography
composable cryptographic security statements
computer aided cryptography
universal composability
complex system
Cryptography
cryptographic proofs
formal methods
verification
formal verification
computer science
Complexity theory
Probabilistic logic
tools
pubcrawl
game theory
encryption
biblio
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
communication
composability
universally composable key bootstrapping
universal composability model
universal composability
strong security notion
session keys
secure key bootstrapping protocol
secure communication protocol
practical key bootstrapping protocol
multiple energy resources
multicast communications
key bootstrapping
ideal functionality
energy internet
security
multicast communication
energy resources
Smart Grids
power engineering computing
Energy Efficiency
smart power grids
internet
Computational modeling
Cryptography
pubcrawl
Protocols
Cryptographic Protocols
telecommunication security
biblio
Lattice Based Authenticated Key Exchange with Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:23pm
Lattices
universally composable security
universal composability
telecommunication security
small integer solution
secure channels
ring-SIS based KEM
rapid development these years
quantum computers
quantum computation
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
message authentication
authenticated channels
lattice based cryptography
key encapsulation mechanism
IoT nodes
Internet of Things
Hash functions
Encapsulation
data privacy
Cryptography
Cryptographic Protocols
composability
authenticated key exchange scheme
authenticated key exchange protocol
authenticated key exchange
biblio
On the Universally Composable Security of OpenStack
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Cloud Security
composability
Modular Security Analysis
openstack
pubcrawl
universal composability
biblio
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Games
universally composable security framework
universal composition operation
universal composability
Task Analysis
secure message communication
pubcrawl
proving simulation-based security
one-time-pad encryption
mechanized UC security analyses
Mechanization
ideally authenticated communication
ideal secure-communication functionality
ideal key-exchange functionality
hard computational problems
protocol verification
game-based security
formal verification
EASYCRYPT proof assistant
EasyCrypt
Diffie-Hellman protocol UC
Diffie-Hellman key-exchange
desired ideal functionality
Decisional Diffie-Hellman problem
Cryptography
Cryptographic Protocols
computer aided cryptography
composability
Complexity theory
complex protocols
biblio
Universally Composable RFID Mutual Authentication
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
security notion
public key update protocols
radiofrequency identification
readers corruptions
Resiliency
RFID Authentication
RFID mutual authentication protocols
RFID tags
Scalability
public key infrastructure
tags corruptions
trusted certificates
trusted cryptographic protocols
trusted third parties
universal composability
universally composable framework
zero-knowledge privacy model
adversary model
public key encryption
public key cryptography
Public key
pubcrawl
Protocols
privacy
PKI Trust Models
Metrics
message authentication code
Human Factors
Human behavior
Cryptographic Protocols
cryptographic protocol
authentication
arbitrary environment
biblio
Garbled Protocols and Two-Round MPC from Bilinear Maps
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
noninteractive zero-knowledge proof system
Yao's garbled circuits construction
witness encryption
universal composability
two-round UC secure protocol
two-round MPC
standards
Resiliency
resilience
Random access memory
random access machines
RAM programs
pubcrawl
Protocols
bilinear maps
multiparty secure computation protocols
Metrics
garbling arbitrary protocols
garbled protocol construction
encryption
encoding
distributed protocol
Cryptographic Protocols
Computational modeling
composability
Circuit Garbling
black box encryption
biblio
A Framework for Universally Composable Diffie-Hellman Key Exchange
Submitted by grigby1 on Tue, 02/27/2018 - 2:34pm
key exchange protocols
universal composability
standards
SIGMA
security of data
reduction proofs
pubcrawl
Protocol Security
protocols building
Protocols
OPTLS
composability
ISO 9798-3
IITM model
encryption
Diffie-Hellman key exchange
DH key exchange
DH-HEMTs
Cryptographic Protocols
cryptographic primitives
Computational modeling
1
2
next ›
last »