Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
discrete logarithm
biblio
Conversion of the Diffie-Hellman Key Exchange Algorithm Based on Elliptic Curve Equations to Elliptic Curve Equations with Private Parameters
Submitted by grigby1 on Thu, 05/05/2022 - 1:20pm
information science
Scalability
Resiliency
resilience
pubcrawl
Program processors
parameter algebra
Metrics
key distribution algorithm
Communications technology
Elliptic curves
Elliptic curve cryptography
elliptic curve
discrete logarithm
Diffie-Hellman
Cryptography
composability
Complexity theory
biblio
Algebraic structure of parametric elliptic curves
Submitted by grigby1 on Thu, 05/05/2022 - 1:19pm
Elliptic curves
Scalability
Resistance
Resiliency
resilience
pubcrawl
parametric algebra
Metrics
information science
Communications technology
Elliptic curve cryptography
elliptic curve
discrete logarithm
Diffie-Hellman
Computers
composability
Complexity theory
biblio
Generation and Distribution Secret Encryption Keys with Parameter
Submitted by grigby1 on Tue, 05/25/2021 - 2:22pm
Human Factors
Workstations
Scalability
Resilient
resilience
Reliability
registration center
public key cryptography
Public key
pubcrawl
Prototypes
parametric algebra
multiplication
Metrics
algebra
Human behavior
exponential
excitation
encryption
distributing
discrete logarithm
cryptosystem
cryptology
cryptographic key
composability
Communication channels
collaboration
biblio
Elliptic curve and Lattice cryptosystem
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
lattice
Vectors
square matrices
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
matrix algebra
Lattices
lattice-based cryptography
lattice cryptosystem
closest vector problem
Homomorphic encryption
finite local ring
encryption
Elliptic curves
Elliptic curve over a ring
Elliptic curve cryptography
elliptic curve
discrete logarithm
digital signatures
Diffie-Hellman
cryptography method
conjugate problem
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
linear codes
theoretical cryptography
structural attacks
strong mathematical background
side-channel attacks
public-key cryptosystem
public-key cryptography
post-quantum standardization
Post-quantum cryptography
polynomials
polynomial time
oldest quantum-resistant proposition
number theory problems
number theory
NIST's announcement
McEliece scheme
pubcrawl
elliptic curve
discrete logarithm
coding theory
code-based cryptography
adequate post-quantum cryptographic schemes
quantum cryptography
side-channel analysis
public key cryptography
quantum computer
Decoding
Computers
Compositionality
physical attacks
encryption
composability