Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
exponentiation
biblio
Current-Mode CMOS Multifunctional Circuits for Analog Signal Processing
Submitted by grigby1 on Tue, 07/18/2023 - 2:23pm
Costs
Synthesizers
multifunctional structures
linearity
functional core
analog signal processing
Low voltage
exponentiation
Human Factors
signal processing
Resiliency
Accuracy
Power demand
Monte Carlo methods
Silicon
Scalability
resilience
pubcrawl
biblio
Digital Signature Performance of a New Quantum Safe Multivariate Polynomial Public Key Algorithm
Submitted by grigby1 on Tue, 07/18/2023 - 2:23pm
Resiliency
public-key cryptography
PQC Performance
Multivariate Polynomials
Multivariate Polynomial Signature Schemes
DS
digital signature schemes
Authentication Algorithms
PQC
exponentiation
Human Factors
pubcrawl
Communication Systems
Post-quantum cryptography
Public key
Portable computers
Java
Benchmark testing
NIST
Industries
Scalability
resilience
biblio
The Fast Paillier Decryption with Montgomery Modular Multiplication Based on OpenMP
Submitted by grigby1 on Tue, 07/18/2023 - 2:23pm
OpenMP
parallel architectures
Montgomery modular multiplication
exponentiation
Paillier
Human Factors
Homomorphic encryption
Resiliency
Chinese remainder theorem
pubcrawl
Distributed databases
Data Security
Artificial Intelligence
programming
data privacy
Scalability
resilience
biblio
A Combined Blinding-Shuffling Online Template Attacks Countermeasure Based on Randomized Domain Montgomery Multiplication
Submitted by grigby1 on Tue, 07/18/2023 - 2:22pm
security
pubcrawl
resilience
Conferences
Correlation
Scalability
side-channel attacks
Consumer electronics
Elliptic curves
Resiliency
Human Factors
exponentiation
Modular Exponent
Online Template Attack
Randomized Montgomery multiplication
Template Attack
biblio
Detecting Reflectional Symmetry of Binary Shapes Based on Generalized R-Transform
Submitted by grigby1 on Tue, 07/18/2023 - 2:22pm
image recognition
reflectional symmetry detection
R-signature
binary shape
exponentiation
Radon transform
Human Factors
Resiliency
Transforms
feature extraction
Shape
Detectors
Biological system modeling
Scalability
Analytical models
resilience
pubcrawl
biblio
Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation
Submitted by grigby1 on Tue, 07/18/2023 - 2:22pm
pubcrawl
resilience
Scalability
Cryptography
Resiliency
Hamming weight
Computational efficiency
Human Factors
exponentiation
Miller loop
Pairing based cryptography
STNFS
biblio
Design of IsoQER Cryptosystem using IPDLP
Submitted by grigby1 on Tue, 07/18/2023 - 2:22pm
Market research
IsoQuadratic Exponentiation Randomized
IsoPartial Discrete Logarithm Problem
Isomathematics
exponentiation
Human Factors
Resiliency
Security analysis
Cyberspace
security
Public key
Complexity theory
Bandwidth
Scalability
Safety
resilience
pubcrawl
biblio
Low-Latency Modular Exponentiation for FPGAs
Submitted by grigby1 on Tue, 07/18/2023 - 2:21pm
computer architecture
pubcrawl
resilience
field programmable gate arrays
Scalability
delays
Complexity theory
Resiliency
Costs
blockchains
Human Factors
exponentiation
Low latency communication
biblio
Fast Modular Exponentiation Methods for Public-Key Cryptography
Submitted by grigby1 on Tue, 07/18/2023 - 2:21pm
Raspberry Pi
window method (WM)
public-key cryptosystem (PKC)
Modular exponentiation (ME)
exponentiation
Human Factors
Resiliency
Communications technology
RSA
security
public key cryptography
energy consumption
Complexity theory
Task Analysis
Java
Scalability
resilience
pubcrawl
biblio
Improvement of Final Exponentiation for a Pairing on FK12 Curve and its Implementation
Submitted by grigby1 on Tue, 07/18/2023 - 2:21pm
pubcrawl
resilience
Scalability
Cryptography
Protocols
Computers
Elliptic curves
Identity-based encryption
Resiliency
elliptic curve
Human Factors
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
1
2
3
4
5
6
7
8
next ›
last »