Filters








411 Hits in 4.2 sec

Multivariate lattices for encrypted image processing

Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
2015 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
It gives support to lattice cryptosystems that allow for encrypted processing of multidimensional signals.  ...  We show an example cryptosystem and prove that it outperforms its RLWE counterpart in terms of security against basis-reduction attacks, efficiency and cipher expansion for encrypted image processing.  ...  This work opens up a broad set of encrypted image processing applications and shows the viability of somewhat homomorphic encryption for efficient privacy-preserving image processing.  ... 
doi:10.1109/icassp.2015.7178262 dblp:conf/icassp/Pedrouzo-UlloaT15 fatcat:e5yj6ijonffbhizk7e5xh4ciy4

Multivariate Cryptosystems for Secure Processing of Multidimensional Signals [article]

Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
2017 arXiv   pre-print
We show an example cryptosystem and prove that it outperforms its RLWE counterpart in terms of security against basis-reduction attacks, efficiency and cipher expansion for encrypted image processing,  ...  The proposed hard problem and the developed techniques give support to lattice cryptosystems that enable encrypted processing of multidimensional signals and efficient conversion between different structures  ...  Evaluation for Encrypted Image Processing We consider two privacy-aware ubiquitous scenarios of outsourced image processing: encrypted correlation between I pairs of square images of size N × N , and encrypted  ... 
arXiv:1712.00848v1 fatcat:qvwgu44yeffyxf3p46k6jruzsa

A Mathematical Perspective on Post-Quantum Cryptography

Maximilian Richter, Magdalena Bertram, Jasper Seidensticker, Alexander Tschache
2022 Mathematics  
(KEMs) CRYSTALS-Kyber, NTRU and SABER; the code-based KEM Classic McEliece; the lattice-based signature schemes CRYSTALS-Dilithium and FALCON; and the multivariate-based signature scheme Rainbow.  ...  Therefore, the main focus is put on the algorithms' corresponding algebraic foundations, in particular LWE problems, NTRU lattices, linear codes and multivariate equation systems with the aim of fostering  ...  Multivariate Cryptography Multivariate cryptography uses multivariate polynomials, i.e., polynomials in multiple variables, for the construction of key pairs.  ... 
doi:10.3390/math10152579 fatcat:rem4jnuxubcjpja35ovdgsmkhu

A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks

Ahmed EL-YAHYAOUI, Fouzia OMARY
2022 International Journal of Communication Networks and Information Security  
This encryption scheme is very simple but efficient and supposed to be resistant to post quantum attacks.  ...  The ELGAMAL encryption scheme is a well-known and efficient public key algorithm designed by Taher ELGAMAL from discrete logarithm problem.  ...  encryption process.  ... 
doi:10.17762/ijcnis.v14i1.5180 fatcat:powkalh5g5emlkciebzeau2cgi

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan
2021 Cryptography  
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit.  ...  Acknowledgments: This research work has been carried out under the leadership of the Institute for Technological Research SystemX, and therefore granted within the scope of the program "Recherche Exploratoire  ...  NTRU Lattice HQC Code Mechanisms SABER Lattice SIKE Supersingular Isogeny CRYSTALS-DILITHIUM Lattice GeMSS Multivariate Polynomial Digital Signature Algorithms FALCON Lattice PICNIC Other RAINBOW Multivariate  ... 
doi:10.3390/cryptography5040038 fatcat:wkb43zunwjagbnljc6brfou4ty

Post-Quantum Crystography based Security Framework for Cloud Computing

Gabriel A.J., Alese B.K, Adetunmbi A.O, Adewale O.S.
2015 Journal of Internet Technology and Secured Transaction  
., office-type) applications to programs such as those for Customer. Cloud computing is the evolution of an existing IT infrastructure that provides a long-dreamed vision of computing as a utility.  ...  PHASE 1 1: Encryption n algorithm id an be modif n the embeddi hese redundan dentifies C's r fied without ing process cr nt bits with da redundant bit t arising W reates a stego ts (i.e., Wendy's image  ...  PHASE 3: Receiver splits Stego Image into Cover Image and CipherText On receiving the Stego Image, S, the receiver performs a reverse of the Message hiding process, to reveal the cover image, C and the  ... 
doi:10.20533/jitst.2046.3723.2015.0044 fatcat:asmaq2zd45b5hirfo7qc7624cm

Symmetric Cryptography [chapter]

2006 Security in Fixed and Wireless Networks  
Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole.  ...  Encryption algorithms are essential to protect sensitive information such as medical data, financial information and Personal Identification Numbers (PINs) from prying eyes.  ...  Partners: RealViz, ENPC/CERTIS, Mokros Image. Hardware implementation of image and video processing algorithms for special effects. • SUPERES: Super Resolution From 2006 to 2008.  ... 
doi:10.1002/0470863722.ch3 fatcat:kye7h3pmnbhkjksvyr4tj4nj7e

symmetric cryptography [chapter]

Martin H. Weik
2000 Computer Science and Communications Dictionary  
Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole.  ...  Encryption algorithms are essential to protect sensitive information such as medical data, financial information and Personal Identification Numbers (PINs) from prying eyes.  ...  Partners: RealViz, ENPC/CERTIS, Mokros Image. Hardware implementation of image and video processing algorithms for special effects. • SUPERES: Super Resolution From 2006 to 2008.  ... 
doi:10.1007/1-4020-0613-6_18768 fatcat:24uzmmq3pbekxhlquwjzglnsve

Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

Manju Lata, Adarsh Kumar
2014 International Journal of Communication Networks and Information Security  
This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems.  ...  There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks.  ...  Strengths: (a) designed for small embedded applications, (b) common in image encryption for example, JPEG2000 images, (c) integration of encryption and decryption mechanisms over single resource constraint  ... 
dblp:journals/ijcnis/LataK14 fatcat:3dpqpm7lnzcbrlhb6uj2nbi7j4

GPU Implementation of Quantum Secure ABC Cryptosystem on Cuda

Sedat Akleylek, Ramazan Koyutürk, Hakan Kutucu
2021 International Workshop on Intelligent Information Technologies & Systems of Information Security  
We compute the required number of arithmetic operations for each process: key generation, encryption and decryption.  ...  Moreover, the encryption process is faster in the GPU implementation. Due to the structure of ABC cryptosystem, the decryption process is slower in the GPU implementation.  ...  The encryption/decryption process of ABC cryptosystem is given in Figure 1 . An invertible multivariate quadratic polynomial system is needed such as 𝐺𝐺: 𝐺𝐺 𝑛𝑛 → 𝐺𝐺 𝑚𝑚 .  ... 
dblp:conf/intelitsis/AkleylekKK21 fatcat:aee4p77z4jh4rd6vji3ma3euva

Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units

SangWoo An, Seog Chung Seo
2020 Mathematics  
In addition, the results of this study can be utilized in image processing technologies such as facial recognition technology.  ...  In the case of NewHope, we present a parallel processing technique for polynomial-based operations.  ...  Modern GPUs handle computer graphics and image processing effectively. The reason for this performance is the structure of the GPU.  ... 
doi:10.3390/math8101781 fatcat:visl2xkcynelzcngizoiqvyo6e

A New Algorithm for Digital Image Encryption Based on Chaos Theory

Yaghoub Pourasad, Ramin Ranjbarzadeh, Abbas Mardani
2021 Entropy  
This technique uses random chaos sequences for encrypting images, and it is a highly-secured and fast method for image encryption. Limited accuracy is one of the disadvantages of this technique.  ...  Thus, a novel technique was proposed for digital image encryption and improved previous algorithms.  ...  Image encryption based on the chaos method is a novel encryption method for images where a random chaos sequence is applied for encrypting the image as an effective way for solving the intractable problems  ... 
doi:10.3390/e23030341 pmid:33805786 pmcid:PMC7998182 fatcat:qqdc6pkrlrapvhr4okasvgamqe

A Comparative Study of ICA Arnold Catmap with Hybridization of ICA based Arnold Catmap using Reversible Cellular Automata

Sanjeev Sharma
2018 International Journal for Research in Applied Science and Engineering Technology  
Image encryption has important role to assure all transmission of image over internet.  ...  Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks.  ...  for image encryption are below.  ... 
doi:10.22214/ijraset.2018.2059 fatcat:nohbvtyoszembil4hysyokdusa

Will quantum computers be the end of public key encryption?

William Buchanan, Alan Woodward
2016 Journal of Cyber Security Technology  
public key encryption alone was, at the very least, going to require far more processing power than would otherwise have been the case.  ...  efficient symmetric-key encryption algorithm for the bulk of the communication.  ...  He has many years of experience in, and continues to conduct research into, cyber security, covert communications, forensic computing and image/signal processing.  ... 
doi:10.1080/23742917.2016.1226650 fatcat:sfcvw3en6jho3jg5bvt5q2fpri

Privacy-Enhanced Machine Learning with Functional Encryption

Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
2019 Zenodo  
This paper introduces the first fully-fledged open source cryptographic libraries for functional encryption.  ...  Finally, the paper discusses the advantages and disadvantages of the alternative approach for building privacy-enhanced machine learning models by using homomorphic encryption.  ...  The values show that for practical param- In Table 2 similar observations can be done for the encryption process.  ... 
doi:10.5281/zenodo.3551691 fatcat:bta45eskejdnlc3btbieo26hka
« Previous Showing results 1 — 15 out of 411 results