Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
random keys
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
biblio
Analysis of Key Randomness in Improved One-Time Pad Cryptography
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
random numbers
random key generation
true random number generator
shuffling algorithm
random keys
Psuedo Random Number Generator
perfect secrecy algorithm
Pearson correlation analysis
one-time pad cryptography
one-time pad
key randomness
key generation
Fisher-Yates shuffling algorithm
Fisher-Yates algorithm
Scalability
OTP
Ciphers
correlation methods
Mice
random number generation
Generators
Prediction algorithms
Metrics
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
biblio
Security modalities on linear network code for randomized sources
Submitted by grigby1 on Mon, 06/11/2018 - 2:34pm
randomized sources
network coding
number random symbols
optimally secure information transmission
Peer-to-peer computing
pubcrawl
r-secure
random keys
random source symbols
randomized source messages
Metrics
resilience
Resiliency
Secure network code
security
security constraints
security modalities
telecommunication security
weakly secure
wiretapped network
information symbols
composability
computational security
Conferences
cryptographic measure
Cryptography
encoding
illegitimate users
imperfectly secure
information rate
adversaries
information theoretic approach
information theoretic security bounds
Knowledge engineering
linear codes
linear network code
linear network coding scheme
Mathematical model
maximized information transmission