Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
polynomial
biblio
Secret Sharing Schemes with Hidden Sets
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
Metrics
uniform distribution
telecommunication security
Shamirs secret sharing scheme
set theory
Resiliency
resilience
pubcrawl
Protocols
polynomials
polynomial
multifactor authentication
Analytical models
malicious dealer
interpolation
Human Factors
Human behavior
detect hidden sets
Cryptography
Cryptographic Protocols
cryptographic keys
Computers
Computational modeling
cloud providers
biblio
Polynomial-based Lightweight Key Management in a Permissioned Blockchain
Submitted by aekwall on Mon, 01/20/2020 - 11:49am
polynomial
transaction confidentiality
telecommunication security
system scalability
security
Scalability
Resiliency
public-key schemes
public-key operations
public-key infrastructure
public key cryptography
pubcrawl
polynomials
polynomial-based schemes
128-bit modulus size
PKI
permissioned blockchain platform
lightweight polynomial-based key management scheme
identity authentication
exponentiation
expensive modular exponentiation operations
data confidentiality
Cryptography
cryptocurrencies
computationally less intensive polynomial evaluation operations
blockchain applications
blockchain
2048-bit RSA
biblio
Post-Quantum Algorithm of Asymmetric Encryption and Its Basic Properties
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Metrics
ring
Resiliency
resilience
quotient ring
quantum cryptography
quantum computing
Public key
post-quantum algorithm
polynomial
NTRU-like cryptosystem NTRU Prime IIT Ukraine
NIST
pubcrawl
Human behavior
field
end-to-end encryption type
encryption
encoding
cryptographic transformations
Computers
Compositionality
composability
basic properties
Asymmetric Encryption