Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
biblio
Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
optimization
TPA
third party auditors
secret key generation algorithms
Secret key
search problems
Resiliency
public key cryptography
pubcrawl
Predictive Metrics
auditing
encryption audits
encryption
decryption purpose
data integrity
cuckoo search algorithm
Cuckoo search
Compositionality
Cloud Computing
biblio
A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Predictive Metrics
SHA-512 algorithm
secure public auditing scheme
secure data dynamics
RSA-15360 algorithm
data dynamics operation
AES-256 algorithm
public-key encryption
cloud service providers
auditing
encryption audits
data storage
Compositionality
Cloud Computing
storage management
public key cryptography
Public key
pubcrawl
Resiliency
security
data integrity
data privacy
data owner
cloud storage
Servers
biblio
Attacking Key Management in Ransomware
Submitted by grigby1 on Wed, 03/17/2021 - 12:43pm
pubcrawl
targeted attacks
steady growth
Scalability
Resiliency
resilience
real-world ransomware
ransomware kill chain
Ransomware
public sector entities
public key cryptography
Public key
attacking key management
private sector entities
opportunistic attackers
NIST
memory attacks
invasive software
extracted keys
encryption
dynamically extracting decryption keys
concerning trends
Computer crime
Chained Attacks
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 12:11pm
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
biblio
Providing Confidentiality in Optical Networks: Metaheuristic Techniques for the Joint Network Coding-Routing and Spectrum Allocation Problem
Submitted by grigby1 on Tue, 02/23/2021 - 2:34pm
genetic algorithm
routing and spectrum allocation
real-world network scenarios
novel metaheuristic algorithms
network coding-based routing and spectrum allocation problem
NC-based RSA algorithms
modified simulated annealing
metaheuristic techniques
joint network coding-routing
elastic optical networks
spectrum utilization
Biological cells
Statistics
Sociology
security
network coding
simulated annealing
genetic algorithms
resource management
telecommunication network routing
composability
public key cryptography
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
NIST
unpredictability properties
statistical testing
security strengths
secure hash function
Scalability
Resiliency
random number generation
random bit generator mechanism
Random Bit Generator
public key cryptography
pubcrawl
pseudorandom bit generators
pseudorandom bit generator mechanism
cryptographic hash functions
Metrics
Hash Function
hard number theoretic problems
Generators
encryption
Elliptic curves
elliptic curve discrete logarithm problem
Elliptic curve cryptography
Electronic mail
derivation function
decryption
cryptographic tasks
biblio
Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
B-curves
standard methods
single design
resource sharing
P-curves
NIST Elliptic Curves
implemented designs
high-speed design
hardware components bus
frequency 1.0 GHz
exchanged messages
encrypting signing messages
field programmable gate arrays
modern communication systems
SCA
confidentiality
ECC
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
Scalability
biblio
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves
Submitted by aekwall on Mon, 02/15/2021 - 4:56pm
Elliptic curve cryptography (ECC)
Weierstrass elliptic curves
side channel analysis (SCA) attacks
random order execution
point doubling operations
point addition
open-source designs
Montgomery ladder
horizontal SCA attacks
horizontal DPA attacks
hardware accelerators
fully balanced ASIC coprocessor
complete addition formulas
Scalability
application specific integrated circuits
coprocessors
Clocks
logic design
Registers
Elliptic curves
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »