Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ring-lwe
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 9:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
attribute based encryption
collaboration
digital signature
digital signatures
gaussian sampling
Human behavior
lattice-based cryptography
policy-based governance
pubcrawl
Resiliency
ring-lwe
Scalability
trapdoor
biblio
\$\textbackslashtextbackslashLambda\$ο\$\textbackslashtextbackslashlambda\$: Functional Lattice Cryptography
Submitted by K_Hooper on Fri, 10/13/2017 - 9:29am
composability
Compositionality
Computing Theory
Computing Theory and Composabilty
Haskell
implementation
lattice-based cryptography
pubcrawl
ring-lwe
biblio
High-Speed Polynomial Multiplier Architecture for Ring-LWE Based Public Key Cryptosystems
Submitted by grigby1 on Mon, 07/24/2017 - 1:10pm
composability
Compositionality
lattice-based cryptography
number theoretic transform
polynomial multiplication
Post-quantum cryptography
pubcrawl
ring-lwe
theoretical cryptography