Efficient NewHope cryptography based facial security system on a GPU

P Duong-Ngoc, TN Tan, H Lee - IEEE Access, 2020 - ieeexplore.ieee.org
With explosive era of machine learning development, human data, such as biometric
images, videos, and particularly facial information, have become an essential training …

[PDF][PDF] A Review: Video Encryption Techniques, Advantages And Disadvantages

TH Obaida, AS Jamil, NF Hassan - Webology (ISSN: 1735-188X), 2022 - webology.org
Digital video contains potentially very important data that needs high protection, So
researchers began competing in how to find ways to preserve data from illegal access …

Toward a real-time elliptic curve cryptography-based facial security system

TT Nguyen, H Lee - 2022 IEEE Asia Pacific Conference on …, 2022 - ieeexplore.ieee.org
This paper presents a novel approach for a facial security system using elliptic curve
cryptography. Face images extracted from input video are encrypted before sending to a …

A video surveillance-based face image security system using post-quantum cryptography

TT Nguyen, QB Phan, TX Nghiem… - … Business Model Net …, 2023 - spiedigitallibrary.org
This paper presents a video surveillance-based face image security system that utilizes post-
quantum cryptography algorithm for enhanced security. The system accurately extracts face …

[PDF][PDF] Efficient Partially-parallel NTT Processor for Lattice-based Post-quantum Cryptography

S Choi, Y Shin, K Lim, H Yoo - JOURNAL OF SEMICONDUCTOR …, 2022 - journal.auric.kr
This paper presents a partially-parallel number theoretic transform (NTT) processor design
for polynomial multipliers, which is a key component of a lattice-based cryptography. Since …

Code-Based Cryptography for Confidential Inference on FPGAs: An End-to-End Methodology

RR Karn, J Knechtel… - 2024 25th International …, 2024 - ieeexplore.ieee.org
Confidential inference (CI) involves leveraging data encryption to safeguard privacy while
allowing inference on encrypted data. Various cryptographic methods, such as …

A Software-Based Low-Latency Elliptic Curve Cryptography Design Over Prime Fields

TT Nguyen, TTB Nguyen - 2024 18th International Conference …, 2024 - ieeexplore.ieee.org
This paper presents an innovative approach that enhances arithmetic operations in elliptic
curve cryptography (ECC) over prime fields. By strategically integrating an efficient point …

High-secure data collection in IoT sensor networks using homomorphic encryption

TT Nguyen, QB Phan, NT Bui - Sensors and Systems for …, 2023 - spiedigitallibrary.org
In wireless sensor networks, sensor nodes are deployed in open environments to gather
and send collected data to a remote server. During the data transmission process, the …