Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ECDH
biblio
Versatile Hardware Framework for Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 07/14/2023 - 2:19pm
Resistance
Side channel hardening
eddsa
Galois fields
Electronic countermeasures
ECDSA
ECDH
public key cryptography
timing
pubcrawl
Elliptic curve cryptography
Scalability
Hardware
FPGA
field programmable gate arrays
Resiliency
resilience
Metrics
biblio
Implementation of Efficient Hybrid Encryption Technique
Submitted by grigby1 on Thu, 07/13/2023 - 11:46am
composability
Asymmetric Encryption
efficient encryption
ECDH
symmetric encryption
Elliptic curves
ECC
Multimedia systems
Elliptic curve cryptography
encryption
Computational modeling
Protocols
authentication
AES
Resiliency
resilience
pubcrawl
biblio
Empirical Study of Standard Elliptic Curve Domain Parameters for IoT Devices
Submitted by grigby1 on Thu, 05/05/2022 - 1:18pm
Metrics
Time measurement
SECP256K1
secp192k1
Scalability
Resiliency
resilience
pubcrawl
privacy
performance evaluation
asymmetric key cryptography
Memory management
Industries
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDH
ECC
composability
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 3:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
Independent credible: Secure communication architecture of Android devices based on TrustZone
Submitted by grigby1 on Thu, 01/28/2021 - 12:32pm
Metrics
TrustZone
TEE
smart phones
security
Scalability
Resiliency
resilience
pubcrawl
android encryption
Human behavior
Hardware
encryption
ECDH
Cryptography
computer science
computer architecture
android
biblio
Analyzing the Attack Landscape of Zigbee-Enabled IoT Systems and Reinstating Users' Privacy
Submitted by willirn1 on Fri, 10/23/2020 - 10:45am
attacks
ECDH
formal analysis
IoT
key management
NCSU
Policy-Governed Secure Collaboration
Principles of Secure BootStrapping for IoT
privacy
Zigbee
Policy-Governed Secure Collaboration
NCSU
Principles of Secure BootStrapping for IoT
2020: July
biblio
Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman
Submitted by grigby1 on Fri, 02/08/2019 - 3:20pm
pubcrawl
Asymmetric Encryption
composability
Compositionality
DH
ECC
ECDH
Human behavior
Metrics
resilience
Resiliency
robotic surgery