Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
theoretical cryptography
biblio
Statistical Analysis of Pseudorandom Sequences and Stegocontainers
Submitted by grigby1 on Fri, 05/20/2022 - 3:33pm
pubcrawl
Generators
Cryptography
web services
NIST
composability
Compositionality
manufacturing
statistical analysis
Industrial engineering
pseudorandom sequences
TestU01
theoretical cryptography
biblio
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT
Submitted by grigby1 on Fri, 05/20/2022 - 3:33pm
Compositionality
theoretical cryptography
secure matrix operations
secure IoT
privacy preserving algorithms
Post-quantum cryptography
Health
support vector machine classification
Industrial Informatics
classification
deep learning
Cybersecurity
Classification algorithms
composability
quantum computing
Cryptography
privacy
pubcrawl
machine learning
machine learning algorithms
biblio
A New LWE-based Homomorphic Encryption Algorithm over Integer
Submitted by grigby1 on Fri, 05/20/2022 - 3:32pm
pubcrawl
Additives
composability
Artificial Intelligence
Compositionality
public key cryptography
information science
Transforms
Homomorphic encryption
LWE
Post-quantum cryptography
public-key encryption
theoretical cryptography
biblio
On Security of Key Derivation Functions in Password-based Cryptography
Submitted by grigby1 on Fri, 05/20/2022 - 3:32pm
encryption
security
pubcrawl
Conferences
authentication
Computer crime
composability
Compositionality
resilience
password
Password-based Cryptography
PBKDF
theoretical cryptography
biblio
Quantifying Geometric Measure of Entanglement of Multi-qubit Graph States on the IBM’s Quantum Computer
Submitted by grigby1 on Fri, 05/20/2022 - 3:32pm
Logic gates
Qubit
pubcrawl
Protocols
composability
Compositionality
Quantum entanglement
Phase measurement
geometric measure of entanglement
Metrology
multi-qubit graph states
quantum computer
quantum state
vertex degree
theoretical cryptography
biblio
Chaos-based Cryptography Using an Underactuated Synchronizer
Submitted by grigby1 on Fri, 05/20/2022 - 3:31pm
pubcrawl
Conferences
composability
chaotic communication
Compositionality
chaos
Synchronization
encryption
Sensitivity
Communications technology
Costs
Industry applications
Liu system
Lyapunov analysis
secure communication
theoretical cryptography
biblio
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
Submitted by grigby1 on Fri, 05/20/2022 - 3:31pm
pubcrawl
Hardware Security
quantum computing
Quantum mechanics
composability
side-channel attacks
Compositionality
Resistance
Power measurement
digital signature
Transforms
standardization
correlation power analysis
number theoretic transform
Post-quantum cryptography
theoretical cryptography
biblio
Graph-Based Lattices Cryptosystem As New Technique Of Post-Quantum Cryptography
Submitted by grigby1 on Fri, 05/20/2022 - 3:31pm
Cryptography
pubcrawl
quantum computing
composability
encoding
Compositionality
NP-hard problem
Lattices
lattice
degree sequence
graphic lattice
Graphics
ice-flower system
sufficient conditions
topological coding
theoretical cryptography
biblio
Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography
Submitted by grigby1 on Fri, 05/20/2022 - 3:30pm
pubcrawl
performance evaluation
quantum computing
composability
Compositionality
Resistance
Lattices
standardization
Costs
Very large scale integration
theoretical cryptography
biblio
A Certificateless Searchable Public Key Encryption Scheme for Multiple Receivers
Submitted by grigby1 on Fri, 04/01/2022 - 12:10pm
theoretical cryptography
CertificateLess cryptography
Cloud Computing
composability
Keyword search
Multiple receivers
pubcrawl
Public key
Receivers
resilience
Resiliency
Resistance
Resists
searchable encryption
trapdoor
web services
1
2
3
4
5
6
7
next ›
last »