Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptography
biblio
Managing Cyber Security with Quantum Techniques
Submitted by grigby1 on Thu, 07/14/2022 - 3:43pm
Cryptography
pubcrawl
Scalability
Computer crime
Planning
Computers
quantum computing
Quantum mechanics
Quantum Key Distribution
Post-quantum cryptography
quantum computing security
biblio
Recent Developments and Methods of Cloud Data Security in Post-Quantum Perspective
Submitted by grigby1 on Thu, 07/14/2022 - 3:43pm
Cryptography
Cloud Computing
pubcrawl
Scalability
Computers
quantum computing
Data Security
Redundancy
outsourcing
Post-quantum cryptography
quantum computing security
biblio
A Pragmatic Analysis of Pre- and Post-Quantum Cyber Security Scenarios
Submitted by grigby1 on Thu, 07/14/2022 - 3:42pm
Pragmatics
quantum computing security
technologies
quantum
problems
Oppel-2
Oppel-1
impact
cyber
Cryptic
information security
Market research
Resistance
Qubit
quantum computing
Computer crime
Cryptography
Scalability
security
pubcrawl
biblio
Enhancing Security in the Industrial IoT Sector using Quantum Computing
Submitted by grigby1 on Thu, 07/14/2022 - 3:41pm
computer architecture
Cloud Computing
pubcrawl
Generators
Scalability
Cryptography
Industrial IoT
Industries
quantum computing
Internet of Things
IBM Quantum
cyber physical systems
random number generators
fourth industrial revolution
QRNG
quantum computing security
biblio
A Primitive Cipher with Machine Learning
Submitted by grigby1 on Wed, 07/13/2022 - 1:13pm
Ciphers
machine learning
pubcrawl
Resiliency
Conferences
Cryptography
Wireless communication
resilience
Artificial Neural Networks
Scalability
Device-to-device communication
outsourcing
exponentiation
edge intelligence
mobile edge learning
biblio
Verifiable Computing Using Computation Fingerprints Within FHE
Submitted by grigby1 on Wed, 07/13/2022 - 1:12pm
Servers
pubcrawl
Resiliency
Hardware
Indexes
privacy
Cryptography
Fingerprint recognition
resilience
Public key
Scalability
verification
fully homomorphic encryption
Homomorphic encryption
exponentiation
SIMD
biblio
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
pubcrawl
Resiliency
Cryptography
Elliptic curve cryptography
Resistance
resilience
Scalability
Poles and towers
Elliptic curves
Identity-based encryption
Costs
elliptic curve
exponentiation
pairing-based cryptography
special TNFS
biblio
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
pubcrawl
Resiliency
authentication
Cryptography
Protocols
Elliptic curve cryptography
resilience
Scalability
Elliptic curves
Identity-based encryption
elliptic curve
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
biblio
Development of Fast Exponentiation Algorithm «To Center and Back
Submitted by grigby1 on Wed, 07/13/2022 - 1:10pm
pubcrawl
Resiliency
Additives
Cryptography
resilience
Scalability
additive chains
binary Al–Kashi algorithm
exponentiation
left–to–right scheme
right–to–left scheme
biblio
Eligibility Analysis of Different Chaotic Systems Derived from Logistic Map for Design of Cryptographic Components
Submitted by grigby1 on Tue, 07/12/2022 - 3:24pm
computer science
substitution box
policy governance
logistic map
cryptology
Hash functions
chaos
Compositionality
Proposals
Metrics
Cryptography
composability
Entropy
Generators
Resiliency
resilience
pubcrawl
collaboration
encryption
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »