Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public-key cryptosystems
biblio
Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
Internet of Things
Transportation
security protocols
Scalability
Resiliency
resilience
Public-Key Cryptosystems (PKC)
public-key cryptosystems
public key cryptography
pubcrawl
privacy and security
Metrics
Medical services
lightweight devices
IoT devices
Internet of Things (IoT)
computer architecture
indoor localization
healthcare facilities
health care
Hardware/Software Co-Design
hardware-software codesign
hardware-software co-design
Hardware
energy consumption
Elliptic-Curve Cryptography (ECC)
elliptic-curve cryptography
Elliptic curve cryptography
ECC
Cryptography
Cryptographic Protocols
biblio
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-Type Groups
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
noncyclic groups
statistical parameter
single malicious server
server computation
secure outsourcing
secure delegation
Scalability
RSA-based group cryptosystems
RSA
Resiliency
public-key cryptosystems
public key cryptography
pubcrawl
probability
cloud computing application scenarios
modular exponentiations
group theory
group exponentiation
fixed-exponent exponentiation
exponentiation
discrete logarithm problem
delegation protocol
cyclic groups
cryptography algorithms
Cryptography
Cryptographic Protocols
cloud server computation
biblio
Evolving side-channel resistant reconfigurable hardware for elliptic curve cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Metrics
Xilinx Kintex-7 FPGA
timing attacks
side-channel resistant reconfigurable hardware
side-channel attacks
security-level
Scalability
Resiliency
reconfigurable hardware design
public-key cryptosystems
public key cryptography
pubcrawl
propagation delay minimization
power analysis attacks
noninvasive side channel attacks
minimisation
Algorithm design and analysis
Hardware
genetic algorithms
genetic algorithm
fitness function
field programmable gate arrays
Evolutionary algorithm
Elliptic curves
elliptic curve discrete logarithm
Elliptic curve cryptography
elliptic curve cryptographic hardware
elliptic curve cryptographic combinational logic circuits
Cryptographic Protocols
cryptographic applications
combinational circuits
circuit size minimization
biblio
A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
hardware resources
Software algorithms
Resiliency
public-key cryptosystems
public-key cryptography schemes
public key cryptography
pubcrawl
prime fields
point multiplication
optimization
Metrics
Instruction sets
Instruction Set Architecture
Algorithm design and analysis
FPGA
field-programmable gate array platform
field programmable gate arrays
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC-ASIP model
ECC custom instructions
custom instruction set
composability
code storage space
application specific instruction set processor
biblio
Providing advanced security mechanism for scalable data sharing in cloud storage
Submitted by grigby1 on Fri, 11/03/2017 - 11:30am
public key cryptography
trees (mathematics)
tree structure
standards
smart cards
Smart card
single key file encryption
Servers
security of data
secret key aggregation
Scalable Security
scalable data sharing
Scalability
public-key cryptosystems
advanced security mechanism
public key crypto system
pubcrawl
KAC
encryption
decryption right allocation
data handling
cloud storage
Cloud Computing
Ciphers
cipher texts
cipher text
Aggregates