Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
random number generation
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by grigby1 on Fri, 01/22/2021 - 12:50pm
chaotic cryptography
pubcrawl
asymmetric cryptography method
chaotic communication
chaotic signal simulation
chaotic synchronization
Cryptography
dynamic systems
Dynamical Systems
encryption circuit
field programmable gate arrays
FPGA
Hopfield neural nets
Hopfield neural networks
human body
information security
Neural networks
random number generation
random number sequence
reconfigurable architectures
reconfigurable hardware
synchronisation
Synchronization
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by aekwall on Tue, 09/08/2020 - 9:11am
field programmable gate arrays
FPGA
Cryptography
information security
Resiliency
pubcrawl
composability
synchronisation
Synchronization
Neural networks
random number generation
Dynamical Systems
Predictive Metrics
chaotic communication
chaotic cryptography
reconfigurable architectures
asymmetric cryptography method
chaotic signal simulation
chaotic synchronization
dynamic systems
encryption circuit
Hopfield neural nets
Hopfield neural networks
human body
random number sequence
reconfigurable hardware
biblio
Crypto Polar Codes based on Pseudorandom Frozen Bits Values and Indices
Submitted by aekwall on Tue, 09/08/2020 - 9:06am
Cryptography
telecommunication security
Resiliency
pubcrawl
composability
Metrics
probability
channel capacity
channel coding
Decoding
error statistics
random number generation
pseudorandom number generator
polar codes
High reliability
232-bit ciphering key
BER probability
crypto polar codes
crypto-system ciphering key
decoding cipher key
decoding obscurity
discrete memoryless channel
discrete memoryless channel capacity
encoder security
generated sequences
grouping polar codes
modern communication systems
MT PRNG
one-bit change
original encoding cipher key
originally sent information data bits
polarized bit channels
pseudorandom frozen bits values
secret Mersenne- Twister pseudo
secret pre-shared initial state
secured system
system secrecy
talented coding technique
biblio
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Cryptography
complex network
telecommunication security
Generators
pubcrawl
composability
Metrics
Resiliency
resilience
encryption
chaos
Degradation
chaotic communication
Logistics
black box
chaotic dynamics
chaotic map
communication securiy
digital computer
discrete-time chaotic maps
dynamics degradation
fixed point arithmetic
fixed-point arithmetic
floating point arithmetic
floating-point arithmetic
logistic map
Orbits
pseudo-random number generator (PRNG)
pseudorandom number generators
Quantization (signal)
random number generation
randomness
SMN
state-mapping network
tent map
black box encryption
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
Ciphers
Cryptography
encryption
Generators
pubcrawl
cryptographic algorithms
Human Factors
policy-based governance
Brute Force Attack
random number generation
avalanche effect
cipher text mapping
Fisher-Yates shuffling algorithm
frequency monobit
information security analysis
one-time pad
one-time pad cryptography
OTP
Prediction algorithms
PRNG
random keys
Refining
ryptography
trng
TRNG key generator
brute force attacks
biblio
Hash Functions are Based on Three-Dimensional Stochastic Transformations
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
Cryptography
information security
Resiliency
pubcrawl
NIST
Generators
random number generation
statistical testing
pseudorandom number generators
Compositionality
Three-dimensional displays
Stochastic processes
Hash functions
3D stochastic transformations
DOZENHASH hashing algorithm
effective protection
heterogeneous supercomputer technologies
input data blocks
level-of-elementary operations
memory size 4.0 Byte
output data blocks
parallel machines
pseudo-random sequence
resulting transformation
square and cube architecture
stochastic methods-of-information security
stochastic protection methods
stochastic transformation
Supercomputers
three-dimensional bytes array
three-dimensional stochastic transformations
unpredictability injection
hash algorithms
biblio
Quantum Services Architecture in Softwarized Infrastructures
Submitted by aekwall on Mon, 03/30/2020 - 10:41am
Scalability
security
Protocols
computer architecture
software defined networking
Resiliency
pubcrawl
composability
standards
software-defined networking
quantum computing
quantum cryptography
quality of service
random number generation
security infrastructure
Switches
Predictive Metrics
Quantum Key Distribution
current networking technology
forward key material
key exchange primitive
logically centralized SDN controller
Madrid Quantum Network
mature development
network integration
open Interfaces.
QKD systems
quantum principles
quantum random number generators
quantum resources
Quantum services architecture
Quantum Switch
quantum switches
quantum technologies
quantum-safe methods
SDN quantum node architecture
secure bit streams
service automation
single network element
software-defined networking architectures
softwarized infrastructures
specific network cards
Telecommunication standards
quantum computing security
biblio
SCR-QRNG: Side-Channel Resistant Design using Quantum Random Number Generator
Submitted by aekwall on Mon, 03/23/2020 - 12:21pm
FPGA
Scalability
Cryptography
Resiliency
Human behavior
pubcrawl
Metrics
Entropy
random number generation
BSI AIS 31
clock frequency modulation
deterministic random bit generator
NIST SP 800-22/90B
PCB module
power side-channel attack and countermeasure
power side-channel attacks
QRNG
quantum entropy chip
quantum entropy source
Quantum random number generator
radioactive decay
radioactive isotope decay
random frequency clock generator
random masking
random number generators
SCR-QRNG framework
security primitives
side-channel countermeasures
side-channel leakages
side-channel resistant design
side-channel resistant primitives
side-channel resistant QRNG
unbiased random numbers
random key generation
biblio
Semi-Finite Length Analysis for Secure Random Number Generation
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
Scalability
Cryptography
Resiliency
Human behavior
pubcrawl
Metrics
Distribution functions
Entropy
Lattices
random number generation
set theory
upper bounds
Upper bound
asymptotic expansion
imperfect random numbers
lower bounds
secure key generation length
secure random number generation
semifinite length analysis
Solids
STEM
random key generation
1
2
3
4
5
next ›
last »