Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
biblio
Empowering Owners with Control in Digital Data Markets
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
Distributed databases
smart contracts
smart contract
Selective Encryption
Resiliency
pubcrawl
Predictive Metrics
Key derivation
encryption audits
authorisation
digital data markets
Digital data market
data owner
Cryptographic Protocols
Compositionality
blockchain-based interaction protocol
blockchain
authorized users
biblio
Parallel DNA Computing Model of Point-Doubling in Conic Curves Cryptosystem over Finite Field GF(2ˆn)
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
mathematical curves
Tile Assembly Model
self-assembly
Resiliency
resilience
public key cryptography
pubcrawl
privacy
Predictive Metrics
point-multiplication
point-doubling
point-addition
Point doubling
parallel DNA computing model
Metrics
biocomputing
Human behavior
Galois fields
Finite Field GF(2ˆn)
finite field GF
encoding
Elliptic curves
Elliptic curve cryptography
DNA cryptography
DNA computing
DNA
Cryptographic Protocols
conic curves cryptosystem over finite held
Conic Curves Cryptosystem
Computational modeling
biblio
Secure Smart Card Signing with Time-based Digital Signature
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
DER Decoder
trusted digital signing process
trusted digital signature
time-based digital signature
time stamping protocol packet
Terminal Attack
smart card terminal
sign documents
Secure Time Stamp
secure smart card signing
Pins
PIN sniffing
message alteration attack
Java Card
electronic signature
security of data
cybersecurity challenges
current smart card digital signature
smart cards
microsoft windows
digital signatures
message authentication
smart phones
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Conferences
Scalability
biblio
Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+
Submitted by grigby1 on Mon, 12/30/2019 - 2:19pm
Mathematical model
TLA+
TLA
Silicon
Scalability
Resiliency
pubcrawl
ProVerif
protocol correctness
pre-meditated correctness
passive attacker
mutual key
communicating parties
liveness property
key agreement protocol verification
ING
GDH
formal verification
exponentiation
divide and conquer key distribution protocol
DC DHKE
Cryptography
Cryptographic Protocols
contributory group key agreement
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
biblio
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-Type Groups
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
noncyclic groups
statistical parameter
single malicious server
server computation
secure outsourcing
secure delegation
Scalability
RSA-based group cryptosystems
RSA
Resiliency
public-key cryptosystems
public key cryptography
pubcrawl
probability
cloud computing application scenarios
modular exponentiations
group theory
group exponentiation
fixed-exponent exponentiation
exponentiation
discrete logarithm problem
delegation protocol
cyclic groups
cryptography algorithms
Cryptography
Cryptographic Protocols
cloud server computation
biblio
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake
Submitted by grigby1 on Wed, 12/11/2019 - 12:23pm
Ouroboros Crypsinous
zero-knowledge
universal-composability
SNARKs
pubcrawl
Protocols
proof-of-work-based Zerocash
proof-of-stake
private ledgers
private blockchain
privacy-preserving proof-of-stake blockchain protocol
privacy
adaptive-security
Leadership
key-private forward secure encryption
distributed-ledger
distributed ledger
data privacy
Cryptographic Protocols
cryptocurrencies
composability
coin evolution technique
blockchain
bitcoin
biblio
Lattice Based Authenticated Key Exchange with Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:23pm
Lattices
universally composable security
universal composability
telecommunication security
small integer solution
secure channels
ring-SIS based KEM
rapid development these years
quantum computers
quantum computation
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
message authentication
authenticated channels
lattice based cryptography
key encapsulation mechanism
IoT nodes
Internet of Things
Hash functions
Encapsulation
data privacy
Cryptography
Cryptographic Protocols
composability
authenticated key exchange scheme
authenticated key exchange protocol
authenticated key exchange
biblio
On Composability of Game-Based Password Authenticated Key Exchange
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Secret key
Password Authenticated Key Exchange
PKI
practical interest
Protocols
provably secure PAKEs
pubcrawl
public key cryptography
public-key infrastructure
password
secure channels
secure composition guarantees
simulation models
standards
Symmetric Key Protocol
telecommunication security
weak forward secrecy
game-based models
Composition Theorem.
Computational modeling
Cryptographic Protocols
Cryptography
data payload encryption
find-then-guess model
FtG model
game theory
composability
game-based password authenticated key exchange protocols
game-based real-or-random definition
Games
higher-level applications
higher-level SKPs
message authentication
PAKE protocols
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »