Efficient NewHope cryptography based facial security system on a GPU
With explosive era of machine learning development, human data, such as biometric
images, videos, and particularly facial information, have become an essential training …
images, videos, and particularly facial information, have become an essential training …
[PDF][PDF] A Review: Video Encryption Techniques, Advantages And Disadvantages
Digital video contains potentially very important data that needs high protection, So
researchers began competing in how to find ways to preserve data from illegal access …
researchers began competing in how to find ways to preserve data from illegal access …
Toward a real-time elliptic curve cryptography-based facial security system
This paper presents a novel approach for a facial security system using elliptic curve
cryptography. Face images extracted from input video are encrypted before sending to a …
cryptography. Face images extracted from input video are encrypted before sending to a …
A video surveillance-based face image security system using post-quantum cryptography
This paper presents a video surveillance-based face image security system that utilizes post-
quantum cryptography algorithm for enhanced security. The system accurately extracts face …
quantum cryptography algorithm for enhanced security. The system accurately extracts face …
[PDF][PDF] Efficient Partially-parallel NTT Processor for Lattice-based Post-quantum Cryptography
This paper presents a partially-parallel number theoretic transform (NTT) processor design
for polynomial multipliers, which is a key component of a lattice-based cryptography. Since …
for polynomial multipliers, which is a key component of a lattice-based cryptography. Since …
Code-Based Cryptography for Confidential Inference on FPGAs: An End-to-End Methodology
Confidential inference (CI) involves leveraging data encryption to safeguard privacy while
allowing inference on encrypted data. Various cryptographic methods, such as …
allowing inference on encrypted data. Various cryptographic methods, such as …
A Software-Based Low-Latency Elliptic Curve Cryptography Design Over Prime Fields
TT Nguyen, TTB Nguyen - 2024 18th International Conference …, 2024 - ieeexplore.ieee.org
This paper presents an innovative approach that enhances arithmetic operations in elliptic
curve cryptography (ECC) over prime fields. By strategically integrating an efficient point …
curve cryptography (ECC) over prime fields. By strategically integrating an efficient point …
High-secure data collection in IoT sensor networks using homomorphic encryption
In wireless sensor networks, sensor nodes are deployed in open environments to gather
and send collected data to a remote server. During the data transmission process, the …
and send collected data to a remote server. During the data transmission process, the …