Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
asymmetric encryption algorithms
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
image colour analysis
text-to-image encryption algorithms
Text-to-Image Encryption
survey
RSA and AES
RGB Value
RGB color value
keeping data
global network
data encryption techniques
Comparison
Asymmetric Encryption
symmetric encryption algorithms
asymmetric encryption algorithms
sensitive data
Cryptography
Software algorithms
public key cryptography
Public key
Image color analysis
text analysis
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
Receivers
encryption
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
man-in-the-middle
weak point
update package encryption process
update
target hardware
symmetric encryption algorithms
symmetric encryption
specific encryption algorithms
secure update process
secure firmware update
safety critical operations
potential attackers
man-in-the-middle attacks
great numbers
asymmetric encryption algorithms
Asymmetric Encryption
security
Hash functions
intellectual property
confidentiality
authenticity
Embedded System
firmware
Metrics
composability
pubcrawl
Resiliency
embedded devices
embedded systems
telecommunication security
Cryptography
biblio
The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
Elliptic curves
Supercomputers
RSA algorithm
Resistance
Resiliency
resilience
pubcrawl
Metrics
method
Human behavior
GOST R 34.10-2001 algorithm
encryption
Algorithm design and analysis
durability
Cryptography
cryptographic strength
computer technology
Compositionality
Clustering algorithms
asymmetric encryption algorithms
asymmetric encryption algorithm
Asymmetric Encryption
Assessment