Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PQC
biblio
Digital Signature Performance of a New Quantum Safe Multivariate Polynomial Public Key Algorithm
Submitted by grigby1 on Tue, 07/18/2023 - 3:23pm
Resiliency
public-key cryptography
PQC Performance
Multivariate Polynomials
Multivariate Polynomial Signature Schemes
DS
digital signature schemes
Authentication Algorithms
PQC
exponentiation
Human Factors
pubcrawl
Communication Systems
Post-quantum cryptography
Public key
Portable computers
Java
Benchmark testing
NIST
Industries
Scalability
resilience
biblio
Performance Analysis of the Quantum Safe Multivariate Polynomial Public Key Algorithm
Submitted by grigby1 on Thu, 07/14/2022 - 6:13pm
Metrics
secure secret exchange
PQC
polynomial root finding
polynomial factoring
Multivariate Polynomial Public Key
MPPK
mathematical models
random key generation
Post-quantum cryptography
public key cryptography
pubcrawl
Java
Benchmark testing
quantum computing
NIST
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures