Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
A Safe and Efficient Message Authentication Scheme In The Internet Of Vehicles
Submitted by grigby1 on Wed, 06/30/2021 - 3:57pm
Metrics
vehicular ad hoc networks
vehicular ad hoc network
security authentication
Resiliency
resilience
public key cryptography
pubcrawl
privacy protection
privacy
Aggregate Signature
Internet of Vehicles
information science
Human Factors
Human behavior
cyber physical systems
component
certificateless public key cryptosystem
authentication
Aggregates
biblio
Generation and Distribution Secret Encryption Keys with Parameter
Submitted by grigby1 on Tue, 05/25/2021 - 3:22pm
Human Factors
Workstations
Scalability
Resilient
resilience
Reliability
registration center
public key cryptography
Public key
pubcrawl
Prototypes
parametric algebra
multiplication
Metrics
algebra
Human behavior
exponential
excitation
encryption
distributing
discrete logarithm
cryptosystem
cryptology
cryptographic key
composability
Communication channels
collaboration
biblio
Identity management using permissioned blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
public key cryptography
identity cards
Identity management
identity management capabilities
identity thefts
India
permissioned blockchain
person identity authentication
personal data hashing
privacy
privacy concepts
private key cryptography
pubcrawl
Human behavior
public-private keys
resilience
Resiliency
Scalability
score-card
security
Self-Sovereign Identity
smart cards
smart contracts
unauthorized hands
US Home Land Security
efficient identity management
authorisation
Bitnation
blockchain technology
contracts
cryptocurrencies
data privacy
design information security
Digital India
distributed ledger
Distributed trust model
distribution control
e-Residency
Aadhar-card
Estonia
ethereum
Fabrics
financial data processing
fraud
fraud cases
Government
government agencies
government data processing
hashing algorithms
homeland security enterprise
biblio
An Implementation and Evaluation of a Pairing on Elliptic Curves with Embedding Degree 14
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
exponentiation
pseudo7-sparse algorithm
pairing-based cryptography
multiplication algorithm bases
multiple devices
generation cryptography
Finite filed arithmetic
efficient curves
computer architecture technology
advanced cryptography
Approximation algorithms
Scalability
elliptic curve
Elliptic curves
Elliptic curve cryptography
public key cryptography
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
encryption
biblio
Hardware Implementation of a Cryptographically Secure Pseudo-Random Number Generators Based on Koblitz Elliptic Curves
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
Scalability
Resiliency
pubcrawl
public key cryptography
random number generation
exponentiation
3-stage pipelined multiplier
clock cycles
cryptographically secure pseudo-random number generator (CPRNG)
cryptographically secure pseudorandom number generator
field-programmable gate array (FPGA)
Koblitz curves
NIST Koblitz elliptic curve K-163
biblio
New Efficient QERPKC based on Partial Discrete Logarithm Problem
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
Elliptic curve cryptography
quadratic exponentiation randomized public key cryptosystem
QERPKC
QER
PDLP hardness
PDLP
partial discrete logarithm problem
exponentiation
PKC
Transmitters
public key encryption
Safety
Security analysis
computational complexity
public key cryptography
Cryptography
pubcrawl
Resiliency
Protocols
security
encryption
Scalability
biblio
A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
exponentiation
semiinterleaved ladders
RSA cryptographic protocol
iterative conditional branching
interleaved variables
fully-interleaved ladders
fully-interleaved ladder properties
fully-interleaved cases
Countermeasures (computer)
Iterative algorithms
Montgomery ladder
interleaved codes
fault detection
Scalability
public-key cryptography
modular exponentiation
side-channel attacks
Registers
Space exploration
public key cryptography
Mathematical model
pubcrawl
Resiliency
Cryptographic Protocols
security
Cryptography
biblio
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
Scalability
Servers
security
Protocols
Resiliency
pubcrawl
privacy
edge computing
public key cryptography
outsourcing
modular exponentiation
exponentiation
Secure outsourcing algorithms
biblio
Simulation of Modular Exponentiation Circuit for Shor's Algorithm in Qiskit
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
4-bit VBE quantum modular exponentiation circuit
x mod 15 circuit
step-by-step manner
Shor's Algorithm incorporating
RSA cryptosystems
quantum modular exponentiation circuit
quantum gates
Qiskit simulator
Qiskit
large-qubit quantum computer
integer factorization problem
example simulation
Ekert proposal
aforementioned circuit
Scalability
Quantum circuit
exponentiation
Qubit
adders
Registers
Integrated circuit modeling
Logic gates
quantum computing
public key cryptography
Computational modeling
pubcrawl
Resiliency
biblio
Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
multiplication temporal complexity
Vectors
vector-module method
vector-modular method
temporal complexity
Scalability
Resiliency
public key cryptography
pubcrawl
asymmetric cryptographic algorithms
multiplication
modular exponentiation
information flow encryption
information flow decryption
exponentiation
ElGamal cryptosystem
Elgamal cryptoalgorithm
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »