Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
scalar multiplication
biblio
Research on Fast Encryption Method for Smart Energy Management System in Smart Gird
Submitted by grigby1 on Tue, 03/22/2022 - 1:52pm
encryption
pubcrawl
resilience
Resiliency
performance evaluation
Scalability
Computational modeling
Smart Grids
Metrics
Elliptic curve cryptography
Smart Grid
smart grid security
simulation
energy management systems
ECC-AES
scalar multiplication
biblio
A variant of the Schnorr signature using an elliptic curve over a field of characteristic two
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
pubcrawl
standards
software engineering
Schnorr signature scheme
Schnorr signature
scalar multiplication
Scalability
Resiliency
public key cryptography
authentication
koblitz Curve
Elliptic curves
elliptic curve
double-and-add scalar multiplication
digital signatures
digital signature
computer science
biblio
Distributed Solution of Scalar Multiplication on Elliptic Curves over Fp for Resource-constrained Networks
Submitted by aekwall on Wed, 05/01/2019 - 12:37pm
wireless sensor networks (WSN)
scalar multiplication
execution time
energy consumption
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Metrics
pubcrawl
Resiliency
Scalability
biblio
A compact and efficient architecture for elliptic curve cryptographic processor
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
heterogeneous function units
word length 576 bit
UMC
size 90 nm
scalar multiplication
Resiliency
Registers
public key cryptography
pubcrawl
parallel processing
Montgomery modular division algorithm
microprocessor chips
Metrics
Kaliski's Montgomery modular inversion
arbitrary curves
hardware complexity
Hardware
Galois fields
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
elliptic curve cryptographic processor
dual-field elliptic curve cryptographic processor
computer architecture
composability
CMOS integrated circuits
CMOS 1 P9M technology
clustering technology
Clustering algorithms
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
pragmatic hazard
side channel attack
Security analysis
scalar multiplication
RNS
Resistance
Resiliency
residue number systems
residue number system
public key cryptography
pubcrawl
Algorithm design and analysis
power analysis
PA-FA countermeasure
Metrics
Manganese
fault injection attack
fault detection
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Electronic mail
composability