Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cathode ray tubes
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 10:35am
Homomorphic encryption
storage paradigm
Scalability
Resiliency
public-key cryptosystem
pubcrawl
Paillier homomorphic encryption scheme
Paillier homomorphic cryptosystem
paillier cryptosystem
modular multiplicative arithmetic
Metrics
improved decryption process
Human Factors
Algorithm
fast decryption process
fast decryption algorithm
encryption
encrypted data
decryption speed
decryption
data privacy
Cryptography
Computational efficiency
computational cost
Complexity theory
Cathode ray tubes
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
key-encryption key
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
Cache-as-RAM
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
Computers
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Internet of Things
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
Asymmetric Encryption
securing multiparty communication
MultiRSA
multiple recipients
Multi-recipient Encryption
lightweight scalable multirecipient asymmetric cryptographic scheme
lightweight AMOUN
high computational cost
group membership changes
dynamic networks
chosen plaintext attack
Chinese remainder theorem
Cathode ray tubes
asymmetric cryptography
communication overhead
encryption
network resources
symmetric cryptography
Compositionality
Security analysis
public key cryptography
Public key
Metrics
privacy
pubcrawl
Human behavior
Resiliency
decryption
Computational efficiency
biblio
A Detection and Defense Approach for Content Privacy in Named Data Network
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
named data network
tools
telecommunication network topology
telecommunication network routing
telecommunication channels
signature based defense
side-channel timing response
side-channel timing attack
Scalability
Resiliency
resilience
pubcrawl
privacy
NDN
Named Data Network Security
Attack detection
IP networks
internet
delays
data privacy
Cryptography
countermeasure methods
content privacy
consumer privacy
computer network security
Cathode ray tubes
cache storage
brute force timing attack
brute force attack model