Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
A complex number approach to elliptic curve cryptosystems over finite fields: implementations and experiments
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
prime field number-crunching
Elliptic curves
execution
field
finite element analysis
Galois fields
Metrics
network security
prime field
elliptic curve discrete alogarithm issue
pubcrawl
public key cryptography
resilience
Resiliency
Scalability
tests
twofold field math
Additives
elliptic curve cryptosystems
Elliptic curve cryptography
elliptic bend number-crunching
elliptic bend number juggling
elliptic bend math
elliptic bend cryptosystems
elliptic bend
double field
computer security
complex numbers
complex number-crunching
complex number approach
complex number
complex fields
arrange security
biblio
Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
Internet of Things
Transportation
security protocols
Scalability
Resiliency
resilience
Public-Key Cryptosystems (PKC)
public-key cryptosystems
public key cryptography
pubcrawl
privacy and security
Metrics
Medical services
lightweight devices
IoT devices
Internet of Things (IoT)
computer architecture
indoor localization
healthcare facilities
health care
Hardware/Software Co-Design
hardware-software codesign
hardware-software co-design
Hardware
energy consumption
Elliptic-Curve Cryptography (ECC)
elliptic-curve cryptography
Elliptic curve cryptography
ECC
Cryptography
Cryptographic Protocols
biblio
Enhancing Big Data Security using Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
map reduce Hadoop
Servers
security of data
security and privacy
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
Big Data
Indium tin oxide
Elliptic curve cryptography
data processing technology
data distribution
data configuration
data analysis
big data security
big data analytics.
biblio
Elliptic curve and Lattice cryptosystem
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
lattice
Vectors
square matrices
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
matrix algebra
Lattices
lattice-based cryptography
lattice cryptosystem
closest vector problem
Homomorphic encryption
finite local ring
encryption
Elliptic curves
Elliptic curve over a ring
Elliptic curve cryptography
elliptic curve
discrete logarithm
digital signatures
Diffie-Hellman
cryptography method
conjugate problem
biblio
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
IoT security
Xilinx platform studio tool
Virtex-5 xc5vfx70t device based platform
Software
secure data transaction
Scalability
RNS implementation
Resiliency
resilience
residue number systems
residue number system (RNS)
residue number system
public key cryptography
pubcrawl
Metrics
IoT Security.
C language
Internet of Things
hardware-software codesign implementation
hardware-software codesign
Hardware software codesign
Hardware
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC cipher
digital signatures
digital signature
compute-intensive components
Communication Systems
Ciphers
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Fault detection method
smaller keys
Scalability
Resiliency
resilience
public key cryptosystems
public key cryptography
pubcrawl
power consumption
Montgomery Scalar Multiplication algorithm
Montgomery ladder
Metrics
key sizes
Hardware
fault injection attack
fault diagnosis
Circuit faults
fault detection
Fault Attacks
embedded devices
Elliptical Curve Cryptography
Elliptic curves
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
efficient fault detection method
efficient countermeasure
ECC
cryptographic computation
Conferences
classical asymmetric cryptosystems
biblio
Efficient Implementation of Cryptography on Points of an Elliptic Curve in Residue Number System
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Metrics
weighted number system
Scalability
RNS
Resiliency
resilience
residue number systems
residue number system
public key cryptography
pubcrawl
Modular Multiplication
adding points
Mathematical model
Jacobian matrices
Galois fields
Elliptic curves
Elliptic curve cryptography
elliptic curve
doubling points
Cryptography
computational complexity
arithmetic operations
biblio
Proxy Re-Encryption using MLBC (Modified Lattice Based Cryptography)
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
encrypted message
efficient encryption
secure proxy re-encryption
Re-encryption time
public key encryption
Proxy re-encryption
proxy key generation time
Modified Lattice Based Cryptography
MLBC
minimal trust proxy
maximum key privacy
Cryptography
efficient proxy re-encryption
cyber-physical systems
resilience
Resiliency
composability
pubcrawl
public key cryptography
data privacy
security
biblio
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
Complexity theory
one-time code-based digital signature scheme
key recovery attack
information set decoding
code-based cryptography
attack complexity
cryptanalysis
Hamming weight
Secret key
Scalability
statistical analysis
public key cryptography
digital signatures
Decoding
Cryptography
pubcrawl
Resiliency
biblio
Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
ECC
State Cryptography Administration
SM2 signature generation schemes
SM2 digital signature generation
SM2
secure cloud cryptography computing
secret sharing based cryptography
key exchange schemes
elliptic curve public key cryptography algorithm
additively homomorphic encryption
China
secret sharing
Homomorphic encryption
Cloud Computing
Elliptic curves
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
Software
data encryption
encryption
digital signature
Scalability
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »