Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Elliptic curves
biblio
Conversion of the Diffie-Hellman Key Exchange Algorithm Based on Elliptic Curve Equations to Elliptic Curve Equations with Private Parameters
Submitted by grigby1 on Thu, 05/05/2022 - 2:20pm
information science
Scalability
Resiliency
resilience
pubcrawl
Program processors
parameter algebra
Metrics
key distribution algorithm
Communications technology
Elliptic curves
Elliptic curve cryptography
elliptic curve
discrete logarithm
Diffie-Hellman
Cryptography
composability
Complexity theory
biblio
Automatic Test Case Generation for Prime Field Elliptic Curve Cryptographic Circuits
Submitted by grigby1 on Thu, 05/05/2022 - 2:20pm
Integrated circuit modeling
VHDL
Testbench
Scalability
Resiliency
resilience
pubcrawl
ModelSim
Metrics
composability
Generators
Galois Field Arithmetic
field programmable gate arrays
Elliptic curves
Elliptic curve cryptography
ECC Operations
Cryptography
biblio
Design and Implementation of an Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)
Submitted by grigby1 on Thu, 05/05/2022 - 2:20pm
mechatronics
Scalability
Resiliency
resilience
Python
pubcrawl
Phase modulation
NIST P-521 Curve
NIST
Metrics
composability
Inversion in modulation
Hash Function
handwriting recognition
finite fields
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
Elliptic curve cryptography
Conferences
biblio
Algebraic structure of parametric elliptic curves
Submitted by grigby1 on Thu, 05/05/2022 - 2:19pm
Elliptic curves
Scalability
Resistance
Resiliency
resilience
pubcrawl
parametric algebra
Metrics
information science
Communications technology
Elliptic curve cryptography
elliptic curve
discrete logarithm
Diffie-Hellman
Computers
composability
Complexity theory
biblio
Data Security And Recovery Approach Using Elliptic Curve Cryptography
Submitted by grigby1 on Thu, 05/05/2022 - 2:19pm
Cloud Computing
composability
Cryptography
decryption
Elliptic curve cryptography
Elliptic curves
encryption
Metrics
pubcrawl
Public key
recovery
resilience
Resiliency
Scalability
Software
Transmitters
biblio
Empirical Study of Standard Elliptic Curve Domain Parameters for IoT Devices
Submitted by grigby1 on Thu, 05/05/2022 - 2:18pm
Metrics
Time measurement
SECP256K1
secp192k1
Scalability
Resiliency
resilience
pubcrawl
privacy
performance evaluation
asymmetric key cryptography
Memory management
Industries
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDH
ECC
composability
biblio
A comparison of Differential Addition and Doubling in Binary Edwards Curves for Elliptic Curve Cryptography
Submitted by grigby1 on Thu, 05/05/2022 - 2:18pm
Market research
Software
security
Scalability
SageMath
Resiliency
resilience
pubcrawl
Protocols
Montgomery ladder
Metrics
benchmark
Indexes
Index Terms
Elliptic curves
Elliptic curve cryptography
elliptic curve
Differential Addition and Doubling
Cryptography
composability
Binary Edwards Curves
biblio
Design and Execution of Highly Adaptable Elliptic Curve Cryptographic Processor and Algorithm on FPGA using Verilog HDL
Submitted by grigby1 on Thu, 05/05/2022 - 2:18pm
Metrics
Verilog
Time-frequency Analysis
Scalability
Resiliency
resilience
Registers
pubcrawl
process control
composability
Memory management
Layout
Karatsuba
FPGA
Elliptic curves
Elliptic curve cryptography
elliptic curve
ECDSA
biblio
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
Submitted by aekwall on Fri, 02/25/2022 - 10:44am
privacy
performance evaluation
authentication
Protocols
pubcrawl
Resiliency
Internet of Things
Industries
Compositionality
Predictive Metrics
provable security
Elliptic curves
Computers
Bilinear Pairing
identity authentication
Key exchange
biblio
Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain
Submitted by aekwall on Fri, 02/25/2022 - 10:42am
blockchain
blockchains
Compositionality
Elliptic curves
Generators
Online banking
Predictive Metrics
Protocols
provable security
pubcrawl
Public key
Resiliency
Steganography
1
2
3
4
5
6
7
next ›
last »