Filters








50 Hits in 3.7 sec

Multivariate Cryptosystems for Secure Processing of Multidimensional Signals [article]

Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
2017 arXiv   pre-print
We show an example cryptosystem and prove that it outperforms its RLWE counterpart in terms of security against basis-reduction attacks, efficiency and cipher expansion for encrypted image processing,  ...  The proposed hard problem and the developed techniques give support to lattice cryptosystems that enable encrypted processing of multidimensional signals and efficient conversion between different structures  ...  It is worth noting that our work focuses on showing the utility of the m-RLWE problem for producing efficient and secure solutions that belong to the field of secure signal processing with multidimensional  ... 
arXiv:1712.00848v1 fatcat:qvwgu44yeffyxf3p46k6jruzsa

Multivariate lattices for encrypted image processing

Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
2015 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
It gives support to lattice cryptosystems that allow for encrypted processing of multidimensional signals.  ...  We show an example cryptosystem and prove that it outperforms its RLWE counterpart in terms of security against basis-reduction attacks, efficiency and cipher expansion for encrypted image processing.  ...  Government and the European Regional Development Fund (ERDF) under projects TACTICA and COMPASS (TEC2013-47020-C2-1-R), and by the Galician Regional Government and ERDF under projects "Consolidation of  ... 
doi:10.1109/icassp.2015.7178262 dblp:conf/icassp/Pedrouzo-UlloaT15 fatcat:e5yj6ijonffbhizk7e5xh4ciy4

Number Theoretic Transforms for Secure Signal Processing [article]

Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
2018 arXiv   pre-print
Approaches based on Secure Signal Processing (SSP) address this challenge by proposing novel mechanisms for signal processing in the encrypted domain and interactive secure protocols to achieve the goal  ...  We exemplify these approaches and evaluate their performance and accuracy, proving that the proposed framework opens up a wide variety of new applications for secured outsourced-processing of multimedia  ...  used in recent years for secure signal processing.  ... 
arXiv:1607.05229v2 fatcat:mrlorcxrrrg7lbfr7khn7mr2xq

A New Cryptographic Key Generation Scheme Using Psychological Signals

V.A. Akhila, C. Arunvinodh, K.C. Reshmi, K.M. Sakthiprasad
2016 Procedia Technology - Elsevier  
Ensuring confidentiality and integrity of secret information is the major concern in the field of Biometric Cryptosystems.  ...  Various types of biometrics are available for encryption and also for decryption. This paper introduces a new technique known as brain wave cryptography.  ...  Independent component analysis [1] tries to separate intoindependent non-gaussian signal from multivariate signal.  ... 
doi:10.1016/j.protcy.2016.08.109 fatcat:atsryukwo5horlmwooahvy7x24

Cybersecurity Challenges Associated with the Internet of Things in a Post-Quantum World

Ohood Althobaiti, Mischa Dohler
2020 IEEE Access  
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.  ...  However, due to the weaknesses of the schemes, lattice-based cryptosystem and multivariate polynomial-based cryptosystems are recommended for improving security in these constrained devices.  ...  The multivariate polynomials that are defined over a finite field is of critical importance because the multivariate public key cryptosystem depends on the utilisation of multivariate polynomials.  ... 
doi:10.1109/access.2020.3019345 fatcat:5h7ac7zngvazndjyhemkco6hhi

Survey of Promising Technologies for Quantum Drones and Networks

Adarsh Kumar, Surbhi Bhatia, Keshav Kaushik, Manjula Gandhi, Gayathri Devi, Diego Pacheco, Arwa Mashat
2021 IEEE Access  
be analyzed for multivariate cryptosystems.  ...  Multivariate Cryptosystem In multivariate cryptosystem, the major challenges observed in recent study include: (i) public key size is large (tens of Kbytes).  ... 
doi:10.1109/access.2021.3109816 fatcat:gkyevfoqrfertef7j7gjzcstii

On Ring Learning with Errors over the Tensor Product of Number Fields [article]

Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
2018 arXiv   pre-print
In this work, we generalize these results and the problems presented by Lyubashevsky et al. to the more general case of multivariate rings, highlighting the main differences with respect to the security  ...  Additionally, the m-RLWE problem is more adequate than its univariate version for cryptographic applications dealing with multidimensional structures.  ...  denoted m-RLWE, which finds application in secure signal processing scenarios.  ... 
arXiv:1607.05244v3 fatcat:3555h2k6wzdvpg6ylauyyedauu

Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography [article]

Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González
2019 IACR Cryptology ePrint Archive  
In this work, we revisit the security of multivariate RLWE and propose new alternative instantiations of the problem that avoid the attack while still preserving the advantages of the multivariate structure  ...  Nevertheless, the recent attack presented by Bootland, Castryck and Vercauteren has some important consequences on the security of the multivariate RLWE problem with "non-coprime" cyclotomics; this attack  ...  multidimensional signal manipulation.  ... 
dblp:journals/iacr/Pedrouzo-UlloaT19 fatcat:y45ql43vfvgljnjchl22riej5e

Revisiting Multivariate Ring Learning with Errors and Its Applications on Lattice-Based Cryptography

Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González
2021 Mathematics  
In this work, we revisit the security of multivariate RLWE and propose new alternative instantiations of the problem that avoid the attack while still preserving the advantages of the multivariate structure  ...  Nevertheless, the recent attack presented by Bootland, Castryck and Vercauteren has some important consequences on the security of the multivariate RLWE problem with "non-coprime" cyclotomics; this attack  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/math9080858 fatcat:b3vbn777wjb5texfvbuedcnaui

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace.  ...  , cyberspace security, cryptography, network security, information system security and information content security.  ...  We would like to thank the following for their help in writing this article: FU JianMin, ZHANG LiQiang, YUAN Wei, XI Ning, LU Di, WU Jun.  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

Reversible Data Hiding In Encrypted Image

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
As a result, the security of information transmitted over public channels is a fundamental problem, and as a result, the confidentiality and integrity of the data is essential to protect against unauthorized  ...  Encryption and steganography are two of the most common methods you can use to ensure safety.  ...  For security reasons, it may be encrypted and sent to the recipient. For incompatibility, select the next pixel for virtual integration. Repeat until the end of the file.  ... 
doi:10.35940/ijitee.i7661.078919 fatcat:r6txstgzw5czxfflmqrq2oewli

Simple Electromagnetic Analysis in Cryptography

Zdenek Martinasek, Vaclav Zeman, Krisztina Trasy
2012 International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems  
On the resulting EM trace, the Hamming weight of the secret key 1 to 8 was clearly visible. This method allows reduction from the number of possible keys for following brute force attack.  ...  After reading the article, the reader is sufficiently informed of any context of SEMA. Another aim of the article is the practical realization of SEMA which is focused on AES implementation.  ...  ACKNOWLEDGMENT Research was sponsored by the Technology Agency of the Czech Republic project TA02011260 and the Ministry of Industry and Trade of the Czech Republic project FR-TI4/647.  ... 
doi:10.11601/ijates.v1i1.6 fatcat:mi4jsfrqrze6zo6s2laz2jkfwa

Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman

Mark Randolph, William Diehl
2020 Cryptography  
Our introduction, review, presentation, and survey of topics are provided for the "non expert", and are ideal for new researchers entering this field.  ...  a side-channel and issue a challenge for further exploration.  ...  cryptosystem [18] .  ... 
doi:10.3390/cryptography4020015 fatcat:dzahrkn6jfh2tml2rsz2se5sxm

Wavelet Support Vector Machine Algorithm in Power Analysis Attacks

S. Hou, Y. Zhou, H. Liu, N. Zhu
2017 Radioengineering  
Especially, wavelet SVM can approximate arbitrary nonlinear functions due to the multidimensional analysis of wavelet functions and the generalization of SVM.  ...  Moreover, wavelet SVM only required an average of 5.4 traces to break the secret key for the unmasked AES implementation and less than 7 traces for the masked AES implementation.  ...  Furthermore, the development of a customized learning algorithm for power analysis attacks will be a challenging area of future work.  ... 
doi:10.13164/re.2017.0890 fatcat:wfpekt77vbca3l7dqrt227iiwa

Special Feature An Introduction to Algorithm Design

Bentley
1979 Computer  
We did, and the modified program processed the reel of tape in five minutes, and actually spent most of its time waiting for the tape!  ...  A colleague of mine had just had his program cancelled-the operators, by counting the turning rate of the tapes, had estimated that it would take about three hours to process his one reel of data.  ...  Acknowledgments This paper has profited from the helpful criticism of many people; the comments of David Jefferson, Len Shustek, and Bruce Weide have been particular, ly helpful.  ... 
doi:10.1109/mc.1979.1658620 fatcat:y5mkmegxljaw5mzsj4vrpbg46a
« Previous Showing results 1 — 15 out of 50 results