[PDF][PDF] End-to-end data security for IoT: from a cloud of encryptions to encryption in the cloud
This paper surveys the symmetric primitives suitable for the unusually strong versatility
requirements of end-to-end encryption in the context of IoT. For example, on the objects …
requirements of end-to-end encryption in the context of IoT. For example, on the objects …
Convolution-Friendly Image Compression in FHE
A Mertens, G Nicolas, S Rovira - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) is a powerful tool that brings privacy and
security to all sorts of applications by allowing us to perform additions and multiplications …
security to all sorts of applications by allowing us to perform additions and multiplications …
Towards video compression in the encrypted domain: A case-study on the h264 and hevc macroblock processing pipeline
D Nokam Kuate, S Canard, R Sirdey - International Conference on …, 2018 - Springer
Image/video compression is a widely used operation in our everyday life. Such an operation
usually proceeds independantly on small rectangular portions, so-called macroblocks, and …
usually proceeds independantly on small rectangular portions, so-called macroblocks, and …
Processing Encrypted Multimedia Data Using Homomorphic Encryption
This chapter is concerned with encryption techniques in the cryptographic sense of the term,
that is, techniques designed to ensure the confidentiality of data in general, regardless of its …
that is, techniques designed to ensure the confidentiality of data in general, regardless of its …
JPEG decompression in the homomorphic encryption domain
Privacy-preserving processing is desirable for cloud computing to relieve users' concern of
loss of control of their uploaded data. This may be fulfilled with homomorphic encryption …
loss of control of their uploaded data. This may be fulfilled with homomorphic encryption …
[PDF][PDF] Evaluation of lossless algorithms for data compression
Data compression is a procedure undertaken to convert the depicted data from one form to
another form post compression, which contains the same information but with the reduced …
another form post compression, which contains the same information but with the reduced …
[PDF][PDF] 通信量削減のための準同型暗号文の圧縮
泉湖雪, 松本茉倫, 小口**人 - マルチメディア, 分散, 協調とモバイル …, 2023 - is.ocha.ac.jp
準同型暗号は暗号文同士の加算や乗算が可能であり, データを秘匿したままで分析し活用可能な
技術の一つである. 準同型暗号の応用例としては暗号化データベースが挙げられる …
技術の一つである. 準同型暗号の応用例としては暗号化データベースが挙げられる …
Computer-implemented method of performing format-preserving encryption of a data object of variable size
MS Boesgaard - US Patent 11,902,417, 2024 - Google Patents
A computer-implemented method of encrypting a data object of variable size utilizing an
inner encryption algorithm can take a variable size input and of outputting, as its output, an …
inner encryption algorithm can take a variable size input and of outputting, as its output, an …
PAnTHErS: un outil d'aide pour l'analyse et l'exploration d'algorithmes de chiffrement homomorphe
C Feron - 2018 - theses.hal.science
Le chiffrement homomorphe est un système de cryptographie permettant la manipulation de
données chiffrées. Cette propriété offre à un utilisateur la possibilité de déléguer des …
données chiffrées. Cette propriété offre à un utilisateur la possibilité de déléguer des …
Traiter des données multimédia chiffrées grâce au chiffrement homomorphe
S Canard, S Carpov, C Fontaine… - Sécurité multimédia 2 …, 2021 - books.google.com
Ce chapitre présente l'état d'avancement des techniques de chiffrement homomorphes, qui
permettent d'effectuer des traitements sur des données chiffrées. Ces techniques sont très …
permettent d'effectuer des traitements sur des données chiffrées. Ces techniques sont très …