Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
exponentiation
biblio
An Implementation and Evaluation of a Pairing on Elliptic Curves with Embedding Degree 14
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
exponentiation
pseudo7-sparse algorithm
pairing-based cryptography
multiplication algorithm bases
multiple devices
generation cryptography
Finite filed arithmetic
efficient curves
computer architecture technology
advanced cryptography
Approximation algorithms
Scalability
elliptic curve
Elliptic curves
Elliptic curve cryptography
public key cryptography
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
encryption
biblio
Hardware Implementation of a Cryptographically Secure Pseudo-Random Number Generators Based on Koblitz Elliptic Curves
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
Scalability
Resiliency
pubcrawl
public key cryptography
random number generation
exponentiation
3-stage pipelined multiplier
clock cycles
cryptographically secure pseudo-random number generator (CPRNG)
cryptographically secure pseudorandom number generator
field-programmable gate array (FPGA)
Koblitz curves
NIST Koblitz elliptic curve K-163
biblio
New Efficient QERPKC based on Partial Discrete Logarithm Problem
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
Elliptic curve cryptography
quadratic exponentiation randomized public key cryptosystem
QERPKC
QER
PDLP hardness
PDLP
partial discrete logarithm problem
exponentiation
PKC
Transmitters
public key encryption
Safety
Security analysis
computational complexity
public key cryptography
Cryptography
pubcrawl
Resiliency
Protocols
security
encryption
Scalability
biblio
Grassmannian Frames in Composite Dimensions by Exponentiating Quadratic Forms
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
Grassmannian frames
unique primes
second-order Reed-Muller Grassmannian frames
quadratic forms
prime decomposition
power-of-two dimension D
orthogonal bases
nonprime-power dimension
mutually unbiased bases
mask sequence
Ker- dock codes
Hadamard matrices
Scalability
generalized Hadamard matrix
explicit sets
element-wise product
different quadratic forms
Delsarte-Goethals codes
Reed-Muller codes
set theory
exponentiation
pubcrawl
Resiliency
biblio
A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
exponentiation
semiinterleaved ladders
RSA cryptographic protocol
iterative conditional branching
interleaved variables
fully-interleaved ladders
fully-interleaved ladder properties
fully-interleaved cases
Countermeasures (computer)
Iterative algorithms
Montgomery ladder
interleaved codes
fault detection
Scalability
public-key cryptography
modular exponentiation
side-channel attacks
Registers
Space exploration
public key cryptography
Mathematical model
pubcrawl
Resiliency
Cryptographic Protocols
security
Cryptography
biblio
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
Scalability
Servers
security
Protocols
Resiliency
pubcrawl
privacy
edge computing
public key cryptography
outsourcing
modular exponentiation
exponentiation
Secure outsourcing algorithms
biblio
Simulation of Modular Exponentiation Circuit for Shor's Algorithm in Qiskit
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
4-bit VBE quantum modular exponentiation circuit
x mod 15 circuit
step-by-step manner
Shor's Algorithm incorporating
RSA cryptosystems
quantum modular exponentiation circuit
quantum gates
Qiskit simulator
Qiskit
large-qubit quantum computer
integer factorization problem
example simulation
Ekert proposal
aforementioned circuit
Scalability
Quantum circuit
exponentiation
Qubit
adders
Registers
Integrated circuit modeling
Logic gates
quantum computing
public key cryptography
Computational modeling
pubcrawl
Resiliency
biblio
Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
multiplication temporal complexity
Vectors
vector-module method
vector-modular method
temporal complexity
Scalability
Resiliency
public key cryptography
pubcrawl
asymmetric cryptographic algorithms
multiplication
modular exponentiation
information flow encryption
information flow decryption
exponentiation
ElGamal cryptosystem
Elgamal cryptoalgorithm
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
biblio
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
microprocessor chips
RSA-OAEP encryption scheme
RSA-OAEP cryptosystem
Rivest-Shamir-Adleman (RSA)
Raspbian OS
Raspbian
Raspberry Pi setup
Raspberry Pi
Rabin-P encryption scheme
Rabin-p cryptosystem
Rabin-p
public key cryptography
pubcrawl
Optimal Asymmetric Encryption Padding (OAEP)
microprocessor platform
exponentiation
Metrics
Linux operating system
Linux
Internet of Things structure
Internet of Things
Human behavior
energy consumption
encryption
embedded devices
decryption process
composability
Asymmetric Encryption
Scalability
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »