Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Table lookup
biblio
A High Speed Montgomery Multiplier Used in Security Applications
Submitted by grigby1 on Tue, 04/19/2022 - 10:46am
Montgomery multiplier
Table lookup
signal processing security
signal processing
Reverse carry propagate adder
Resiliency
resilience
pubcrawl
privacy
exponentiation
Metrics
Filtering
delays
data communication
cryptosystem
Cryptography
composability
adders
biblio
Efficient Acceleration of Decision Tree Algorithms for Encrypted Network Traffic Analysis
Submitted by grigby1 on Tue, 03/01/2022 - 4:19pm
Pipelines
Wires
Vegetation
threat
telecommunication traffic
Table lookup
Scalability
Resiliency
resilience
pubcrawl
Acceleration
network on chip security
Network
Metrics
detection
Decision trees
Decision Tree
Cryptography
composability
biblio
Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection
Submitted by grigby1 on Fri, 02/04/2022 - 2:49pm
Hardware
Table lookup
shadow stack
Runtime
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
resilience
programming
message authentication code
rop attacks
Costs
codes
authentication
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Enhancing SAT-Attack Resiliency and Cost-Effectiveness of Reconfigurable-Logic-Based Circuit Obfuscation
Submitted by aekwall on Fri, 02/04/2022 - 10:35am
reverse engineering
security
Observability
Routing
resilience
pubcrawl
Integrated circuit modeling
logic locking
Switching circuits
Resiliency
Table lookup
LUT-based obfuscation
Reconfigurable Logic
SAT-based attack
biblio
An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 4:11pm
security
encryption
pubcrawl
Metrics
Resiliency
composability
Time complexity
Cryptography
IEEE Regions
SAS strcuture
structural analysis
Synthetic aperture sonar
Table lookup
white-box
White Box Security
biblio
SPFA: SFA on Multiple Persistent Faults
Submitted by grigby1 on Thu, 09/30/2021 - 12:54pm
multiple fault diagnosis
Transient analysis
Table lookup
statistical fault analysis
Resiliency
resilience
Random access memory
pubcrawl
persistent fault attack
Ciphers
Metrics
maximum likelihood estimation
Human Factors
Human behavior
Fault attack
encryption
cyber physical systems
Circuit faults
biblio
A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm on FPGA
Submitted by grigby1 on Wed, 09/01/2021 - 2:14pm
Advanced Encryption Standard (AES) Algorithm
Artix-7 FPGA
encryption
field programmable gate arrays
Field Programmable Gate Arrays (FPGA)
Hardware
i-o systems security
Input/Output (I/O) and Global Buffer (BUFG)
Look Up Tables (LUTs)
pubcrawl
Registers
Scalability
Slice Register (SR)
standards
Table lookup
biblio
Hardware Design of Polynomial Multiplication for Byte-Level Ring-LWE Based Cryptosystem
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
NIST PQC Standardization Process
BRAMs
byte-level modulus
byte-level ring-LWE based cryptosystem
computational time-consuming block
DSPs
high-level synthesis based hardware design methodology
ideal lattice
LAC
multiplication core
high level synthesis
polynomial multiplication
ring learning with error problem
ring LWE
time 4.3985 ns
time 5.052 ns
time 5.133 ns
Vivado HLS compiler
Xilinx Artix-7 family FPGA
NIST
Scalability
lattice-based cryptography
Cryptography
Hardware
Table lookup
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
field programmable gate arrays
post quantum cryptography
timing
polynomials
Software algorithms
Compositionality
program compilers
compiler security
logic design
biblio
Highly Area-Efficient Implementation of Modular Multiplication for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
koblitz Curve
Virtex-7 FPGA technology
Throughput
Table lookup
Scalability
Resiliency
Registers
public-key cryptosystem
Public Key Cryptography (PKC)
public key cryptography
pubcrawl
multiplying circuits
Metrics
LUT-FF pairs
logic design
256-bit modified interleaved modular multiplication
Interleaved Modular Multiplication (IMM)
IMM
hardware implementation design
Hardware Architecture (HA)
Hardware
flip-flops
field programmable gate arrays
Field Programmable Gate Array (FPGA)
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC operation
Cryptography
cryptographic operation
computer architecture
biblio
Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
cloud computation server
arithmetic operations
multi-threading
privacy preserving
storage costs
FHE
bit-wise encoding
bit-wise implementation
bit-wise operation
Homomorphic encryption
function evaluation
lookup table
privacy preserving calculation
single-input function
single-integer input function
time 13.0 min
time 60.0 min
two-input function
Protocols
Scalability
Servers
cloud servers
Cryptography
encrypted data
encryption
data privacy
Table lookup
Cloud Computing
Resiliency
pubcrawl
Metrics
Databases
information retrieval
fully homomorphic encryption
Human Factors
encoding
1
2
3
next ›
last »