Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
lattice cryptography
biblio
A Study of Post Quantum Cipher Suites for Key Exchange
Submitted by grigby1 on Fri, 09/16/2022 - 4:54pm
standardization
Supersingular Isogenies
Ring Learning With Errors (RLWE)
lattice cryptography
Key Pair Generation
Key exchange
Error Code Correcting
Cryptographic Benchmarking
Post Quantum Cryptography (PQC)
codes
Resiliency
security
Wires
forward error correction
digital signature
Resistance
composability
quantum computing
Computers
NIST
Metrics
pubcrawl
biblio
Identity-Based Integrity Verification (IBIV) Protocol for Cloud Data Storage
Submitted by grigby1 on Tue, 04/19/2022 - 1:16pm
pubcrawl
SIS problem
signature based defense
Servers
Scalability
Resiliency
resilience
Quantum Safe Cryptography
quantum computing
Bloom filter
Protocols
Memory
Lattices
lattice cryptography
IDBased cryptography
data privacy
Cloud storage system
Cloud Computing
biblio
T-PKI for Anonymous Attestation in TPM
Submitted by aekwall on Tue, 01/25/2022 - 3:50pm
public key cryptography
Transient analysis
tpm
TCG
Quantum safe
lattice cryptography
anonymity
attestation
electronic commerce
security
composability
Human behavior
Resiliency
pubcrawl
Conferences
cloud
Cloud Computing
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Submitted by grigby1 on Wed, 05/16/2018 - 1:42pm
Human behavior
human factor
lattice cryptography
lightweight cryptography
Post-quantum cryptography
pubcrawl
radio frequency identification
resilience
Resiliency
RFID
RFIDs
ring-LWE encryption