Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
theoretical cryptography
biblio
An Anti-Quantum Signature Scheme over Ideal Lattice in Blockchain
Submitted by aekwall on Mon, 11/29/2021 - 2:29pm
security
blockchain
Resists
encryption
pubcrawl
composability
Elliptic curve cryptography
standards
Compositionality
anti-quantum
bonsai trees
gaussian distribution
ideal lattice
Lattices
theoretical cryptography
biblio
On Generation of Cycles, Chains and Graphs of Pairing-Friendly Elliptic Curves
Submitted by aekwall on Mon, 11/29/2021 - 2:29pm
Task Analysis
blockchain
Protocols
estimation
pubcrawl
composability
Compositionality
complex multiplication method
Elliptic curves
pairing-friendly elliptic curves
SNARKs
theoretical cryptography
biblio
Routing on Quantum Repeater Networks
Submitted by aekwall on Mon, 11/29/2021 - 2:28pm
Task Analysis
Routing
pubcrawl
composability
Compositionality
quantum computing
Quantum entanglement
Repeaters
Switching circuits
theoretical cryptography
biblio
The Strategy of Beating the Intermediate Basis Attack in Quantum Communication Networks
Submitted by aekwall on Mon, 11/29/2021 - 2:28pm
Protocols
pubcrawl
composability
Compositionality
eavesdropping
Bit error rate
Photonics
Quantum bit error rate
Quantum communication networks
quantum cryptography
WNl9 strategy
theoretical cryptography
biblio
Analyzing Cryptographic API Usages for Android Applications Using HMM and N-Gram
Submitted by aekwall on Mon, 11/29/2021 - 2:27pm
Cryptography
Markov processes
Libraries
tools
Analytical models
pubcrawl
composability
Probabilistic logic
Compositionality
Hidden Markov models
android
API analysis
cryptographic API
hidden Markov model
N-gram
theoretical cryptography
biblio
Guesswork with Quantum Side Information: Optimal Strategies and Aspects of Security
Submitted by aekwall on Mon, 11/29/2021 - 2:27pm
pubcrawl
composability
Compositionality
theoretical cryptography
biblio
Experimental Study of Secure PRNG for Q-trits Quantum Cryptography Protocols
Submitted by aekwall on Mon, 11/29/2021 - 2:27pm
pubcrawl
composability
Compositionality
Cybersecurity
deterministic protocol
NIST STS
PRNG
pseudorandom numbers
Q-trit
quantum cryptography
statistical stability
theoretical cryptography
biblio
Physical-Layer Cooperative Key Generation with Correlated Eavesdropping Channels in IoT
Submitted by grigby1 on Tue, 08/31/2021 - 12:08pm
Metrics
wireless sensor networks
security
Scalability
Resiliency
resilience
Relays
random key generation
pubcrawl
physical layer security
partially colluding eavesdroppers
theoretical cryptography
key rate
key generation
Internet of Things
Human behavior
eavesdropping
Correlation
correlated eavesdropping channels
Channel estimation
Compositionality
composability
biblio
An Elliptic Curve-based Protocol for Privacy Preserving Frequency Computation in 2-Part Fully Distributed Setting
Submitted by aekwall on Tue, 07/27/2021 - 2:06pm
Elliptic Curve Cryptosystem
Systems engineering and theory
secure multi-party computation
Resiliency
pubcrawl
Protocols
privacy-preserving data mining
Privacy preserving frequency computation
privacy
Knowledge engineering
theoretical cryptography
Elliptic curve cryptography
data privacy
Computing Theory and Privacy
Computing Theory
Computational efficiency
2-part fully distributed setting
Compositionality
composability
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »