Filters








3,196 Hits in 6.2 sec

Secret Key Cryptosystem based on Non-Systematic Polar Codes [article]

Reza Hooshmand
<span title="2014-01-07">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Polar codes are a new class of error correcting linear block codes, whose generator matrix is specified by the knowledge of transmission channel parameters, code length and code dimension.  ...  With the help of this method, a secret key cryptosystem is proposed based on non-systematic polar codes.  ...  In 1993, Alencar et al. proposed a secret key cryptosystem based on burst error correcting codes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1310.6485v2">arXiv:1310.6485v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vk4rqbu5ana33p6ho5pdmnbl34">fatcat:vk4rqbu5ana33p6ho5pdmnbl34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191024220132/https://arxiv.org/pdf/1310.6485v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/49/ff/49ff9509762ff09465b4fd57fe3650ad22228086.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1310.6485v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cryptography with Constant Input Locality

Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
<span title="2009-04-11">2009</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
On the positive side, assuming the intractability of certain problems from the domain of error correcting codes (namely, hardness of decoding a random linear code or the security of the McEliece cryptosystem  ...  ), we obtain new constructions of one-way functions, pseudorandom generators, commitments, and semantically-secure public-key encryption schemes whose input locality is constant.  ...  Semantically Secure Public-Key Encryption in Local O(1) 3 We construct a semantically-secure public-key encryption scheme (PKE) whose encryption algorithm is in Local O(1) O (1) .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-009-9039-0">doi:10.1007/s00145-009-9039-0</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bflxo6zcw5g27hbmcspq5doory">fatcat:bflxo6zcw5g27hbmcspq5doory</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150430120833/http://iacr.org/archive/crypto2007/46220092/46220092.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d9/bd/d9bd4721613991a1609c08f19c6468fa04afb14d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-009-9039-0"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Computational Code-Based Privacy in Coded Federated Learning [article]

Marvin Xhemrishi, Alexandre Graell i Amat, Eirik Rosnes, Antonia Wachter-Zeh
<span title="2022-02-28">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We propose a privacy-preserving federated learning (FL) scheme that is resilient against straggling devices.  ...  The proposed scheme employs code-based cryptography to ensure computational privacy of the private data, i.e., no device with bounded computational power can obtain information about the other devices'  ...  ACKNOWLEDGMENT The authors would like to thank Reent Schlegel for his helpful comments and providing his simulation code.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2202.13798v1">arXiv:2202.13798v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/674skja5a5ccvnkp6sxv4lsyji">fatcat:674skja5a5ccvnkp6sxv4lsyji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220515023402/https://arxiv.org/pdf/2202.13798v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6c/49/6c49a94551c77105f5a75b5db5c2180b3f4c3692.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2202.13798v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Coding-Based Oblivious Transfer [chapter]

Kazukuni Kobara, Kirill Morozov, Raphael Overbeck
<span title="">2008</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This is a step towards diversifying computational assumptions on which OT -cryptographic primitive of central importance -can be based.  ...  a permuted subcode of a given code.  ...  The second author would also like to thank Yang Cui for his pointer on verifiable encryption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-89994-5_12">doi:10.1007/978-3-540-89994-5_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/q7dnrwlphvc5vnenhezcr6bboy">fatcat:q7dnrwlphvc5vnenhezcr6bboy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130903072708/http://eprint.iacr.org:80/2007/382.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d1/7f/d17f5c59d823c844c6d909f080a4a499e493e84f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-89994-5_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Public key cryptography and error correcting codes as Ising models

David Saad
<span title="">2001</span> <i title="AIP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3jzz7zp4afbbpdcvegp6zk7rp4" style="color: black;">AIP Conference Proceedings</a> </i> &nbsp;
We show how these codes may also be employed as a practical public-key cryptosystem and are of competitive performance to modern cyptographical methods.  ...  We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes.  ...  We discussed the relation between Ising models, certain error-correcting codes and public-key cryptosystems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1063/1.1358168">doi:10.1063/1.1358168</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7gtjdwsbcrhxngvubofumdt32e">fatcat:7gtjdwsbcrhxngvubofumdt32e</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-cond-mat0008363/cond-mat0008363.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/83/8f83d7a23b4fc8be8e8418d8c1fdd4ab3cd3502f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1063/1.1358168"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

PARTIAL ENCRYPTION OF COMPRESSED VIDEO

Reena R. Ambekar .
<span title="2013-04-25">2013</span> <i title="eSAT Publishing House"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m4rdj3kwwfcbvfzkv6kcnagwtm" style="color: black;">International Journal of Research in Engineering and Technology</a> </i> &nbsp;
We apply encryption algorithm to encrypt only the crucial parts, which are considerably smaller than original image, which result in significant reduction in processing time and computational requirement  ...  Real-time secure image and video communication is challenging due to the processing time and computational requirement for encryption and decryption.  ...  In this way, error is localized and precise localization results more correct decoding [13] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2013.0204055">doi:10.15623/ijret.2013.0204055</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oy5ue7t43bbrnpmhbnskjdkyty">fatcat:oy5ue7t43bbrnpmhbnskjdkyty</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200214005910/https://ijret.org/volumes/2013v02/i04/IJRET20130204055.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/a6/1ba6bbefbb2306cf541fa607db063fa76f5906b3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2013.0204055"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Wild McEliece [chapter]

Daniel J. Bernstein, Tanja Lange, Christiane Peters
<span title="">2011</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper also presents list-decoding algorithms that efficiently correct even more errors for the same codes over F q .  ...  This paper presents a generalized cryptosystem that uses length-n codes over small finite fields F q with dimension ≥ n − m(q − 1)t efficiently correcting qt/2 errors where q m ≥ n.  ...  The McEliece public-key cryptosystem. Choose a linear code C over F q of length n and dimension k which can correct w errors. Take a generator matrix G for C.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-19574-7_10">doi:10.1007/978-3-642-19574-7_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/adzvq3xhljhh3nrko63t5pyciu">fatcat:adzvq3xhljhh3nrko63t5pyciu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110331222310/http://eprint.iacr.org/2010/410.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/69/db69cf7352588a95c8f9404a03ac8c8c4d9f21b6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-19574-7_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Preserving Data Integrity of Encoded Medical Images: The LAR Compression Framework [chapter]

Marie Babel, François Pasteau, Clément Strauss, Maxime Pelcat, Laurent Bédat, Médéric Blestel, Olivier Déforges
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ofs2kbxnpzeeto5wtnrfgobke4" style="color: black;">Intelligent Systems Reference Library</a> </i> &nbsp;
Thus protection processes against transmission errors have to be added to get a powerful joint source-channel coding tool.  ...  In particular, the LAR image coding method is defined together with advanced securization services.  ...  Acknowledgements This work is supported by the French National Research Agency as part of the CAIMAN project (ANR-08-VERS-002).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-24693-7_4">doi:10.1007/978-3-642-24693-7_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gef7wjgbzrbanembsqnhdhdgju">fatcat:gef7wjgbzrbanembsqnhdhdgju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130701172447/http://hal-univ-rennes1.archives-ouvertes.fr/docs/00/65/81/30/PDF/Babel_-_Content_protection_-_IETR_INSA.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ec/5e/ec5e4c97d61637d61841d5d558b051bb9e094bf6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-24693-7_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

RAPTOR CODE BASED SECURE STORAGE IN CLOUD COMPUTING

R. MYTHILI, P. PRADHEEBA, P. RAJESHWARI, S. PADHMAVATHI
<span title="">2016</span> <i title="Institute for Project Management Pvt. Ltd"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wf4zauwmhfgtxa3una6bns6vsq" style="color: black;">International journal of computer and communication technology</a> </i> &nbsp;
By utilizing the homomorphic token with distributed verification of raptor coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification  ...  The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-peruse service business model known as cloud computing.  ...  Correctness Verification and Error Localization Error localization is a key prerequisite for eliminating errors in storage systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47893/ijcct.2016.1385">doi:10.47893/ijcct.2016.1385</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/folkjtwlyvdqrfy4llw3d7l6bi">fatcat:folkjtwlyvdqrfy4llw3d7l6bi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201215150238/https://www.interscience.in/cgi/viewcontent.cgi?article=1385&amp;context=ijcct" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0d/6e/0d6e3397bc86195a58a765f7742850a8c29c3959.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47893/ijcct.2016.1385"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Securing fingerprint template: Fuzzy vault with minutiae descriptors

Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mlkexztp5vbdfo3nlsmbuf4oia" style="color: black;">Pattern Recognition (ICPR), Proceedings of the International Conference on</a> </i> &nbsp;
This encryption makes it difficult for an adversary to decode the vault even if the correct set of minutiae is selected.  ...  At the same time, vault security as measured in terms of min-entropy, is increased from 31 bits to 47 bits in case a perfect code is used.  ...  The above security analysis assumes the use of a perfect error correction coding scheme (a w-error correcting binary code of size 2 N is said to be perfect if for every word C ′ , there is a unique codeword  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icpr.2008.4761459">doi:10.1109/icpr.2008.4761459</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icpr/NagarNJ08.html">dblp:conf/icpr/NagarNJ08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dqf24kic25dchlxmgmsdvy7fou">fatcat:dqf24kic25dchlxmgmsdvy7fou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808085909/http://biometrics.cse.msu.edu/Publications/SecureBiometrics/NagarNandakumarJainFVDescriptors_ICPR08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c3/89/c38930a762d7296bfafe57a3efa0f080fc1a49df.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icpr.2008.4761459"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Failure of the McEliece public-key cryptosystem under message-resend and related-message attack [chapter]

Thomas A. Berson
<span title="">1997</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The McEliece public-key cryptosystem fails to protect any message which is sent to a recipient more than once using different random error vectors.  ...  Under these conditions, which are easily detectable, the cryptosystem is subject to a devastating attack which reveals plaintext with a work factor which is 10 15 times better than the best general attack  ...  The author is grateful to Susan Langford, to Kevin McCurley, and to Matt Robshaw for their clarifying discussions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0052237">doi:10.1007/bfb0052237</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oj6ar6bq25fz7l5r27x25osxra">fatcat:oj6ar6bq25fz7l5r27x25osxra</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070801162837/http://www.anagram.com/berson/mceliece.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/67/b8/67b8a7ae75b6f1354e6b0d7ca37a0dbee6dfc322.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0052237"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Error Correction in the Bounded Storage Model [chapter]

Yan Zong Ding
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
All previous schemes and protocols in the model assume a perfectly consistent view of the public source from all parties, and do not function correctly in presence of errors, while the private-key encryption  ...  The main ingredients of our constructions are averaging samplers (Bellare and Rompel, FOCS '94), randomness extractors (Nisan and Zuckerman, JCSS, 1996), error correcting codes, and fuzzy extractors (Dodis  ...  Acknowledgment I thank Michael Rabin and Salil Vadhan for numerous insightful discussions on the bounded storage model, in particular the one that brought up the issue of error correction.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30576-7_31">doi:10.1007/978-3-540-30576-7_31</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uziixtzpmfhfbihz3nnomzwzd4">fatcat:uziixtzpmfhfbihz3nnomzwzd4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503115503/https://link.springer.com/content/pdf/10.1007%2F978-3-540-30576-7_31.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/04/b8/04b8f795ce8ef6d5a4ac6be9b3c391992801daad.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30576-7_31"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Proofs of retrievability

Kevin D. Bowers, Ari Juels, Alina Oprea
<span title="">2009</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2009 ACM workshop on Cloud computing security - CCSW &#39;09</a> </i> &nbsp;
A proof of retrievability (POR) is a compact proof by a file system (prover) to a client (verifier) that a target file F is intact, in the sense that the client can fully recover it.  ...  It supports a fully Byzantine adversarial model, carrying only the restriction-fundamental to all PORs-that the adversary's error rate be bounded when the client seeks to extract F .  ...  A public-key adversarial code is one in which encode gets secret input φ.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1655008.1655015">doi:10.1145/1655008.1655015</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BowersJO09a.html">dblp:conf/ccs/BowersJO09a</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ac54aif7rbewjj6dajsuianbya">fatcat:ac54aif7rbewjj6dajsuianbya</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120509204732/http://eprint.iacr.org/2008/175.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/11/9411ddb9b86ad4879c0932fa6260c57e7a7cfb21.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1655008.1655015"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Gb/s One-Time-Pad Data Encryption With Synchronized Chaos-Based True Random Bit Generators

Apostolos Argyris, Evangelos Pikasis, Dimitris Syvridis
<span title="2016-11-15">2016</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eo7ayeunzba63co4cxddmhlwma" style="color: black;">Journal of Lightwave Technology</a> </i> &nbsp;
Forward error correction coding is applied on the encryption scheme, in order to drastically reduce the errors of the synchronized true random bit sequences and optimize the decoding performance of the  ...  The concurrent fulfillment of both conditions is shown in this work and is used to demonstrate experimentally the one-time-pad encryption communication protocol.  ...  Forward error correction (FEC) encoding is applied in these sequences, which are then used to encrypt / decrypt data sharing in a different communicating channel.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jlt.2016.2615870">doi:10.1109/jlt.2016.2615870</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/z7atufzqjvepdektchxvnr44cm">fatcat:z7atufzqjvepdektchxvnr44cm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190501023448/http://digital.csic.es/bitstream/10261/157228/3/Gb-s_preprint.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/08/970837ae263eb6cbdfa37fe12ec78af3a19cb029.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jlt.2016.2615870"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Designing an Efficient Image Encryption-then Compression System
IJIREEICE - Electrical, Electronics, Instrumentation and Control

B. Suneetha
<span title="2015-03-15">2015</span> <i title="Tejass Publisheers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s7xsrjol7bcyjpobqp3ahbu3ja" style="color: black;">IJIREEICE</a> </i> &nbsp;
The proposed image encryption scheme operated in the prediction error domain is shown to be able to provide a reasonably high level of security.  ...  More notably, the proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency, than the state-of-the-art lossless/lossy image coders, which take  ...  As the AC module is completely public and invertible, the attacker can obtain the encrypted image I e , which is formed by concatenating L clusters of prediction error sequences.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17148/ijireeice.2015.3321">doi:10.17148/ijireeice.2015.3321</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/awpspzdgvjcjtgyb5xpx3hxi2y">fatcat:awpspzdgvjcjtgyb5xpx3hxi2y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602185355/https://ijireeice.com/upload/2015/march-15/IJIREEICE21.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/36/77/367731b42453f359ba459f888d05c65c9d04fbca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17148/ijireeice.2015.3321"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 3,196 results