Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperMay 2018
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityPages 253–260https://doi.org/10.1145/3196494.3196505A distinguisher is employed by an adversary to explore the privacy property of a cryptographic primitive. If a cryptographic primitive is said to be private, there is no distinguisher algorithm that can be used by an adversary to distinguish the ...
- research-articleJuly 2016
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile NetworksPages 21–30https://doi.org/10.1145/2939918.2939933Physical layer security for wireless communication is broadly considered as a promising approach to protect data confidentiality against eavesdroppers. However, despite its ample theoretical foundation, the transition to practical implementations of ...
- short-paperOctober 2015
Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion
MM '15: Proceedings of the 23rd ACM international conference on MultimediaPages 1063–1066https://doi.org/10.1145/2733373.2806406The paper "An Efficient Image Homomorphic Encryption Scheme with Small Ciphertext Expansion" In Proc. ACM MM'13, pp.803--812) presented a novel image homomorphic encryption approach achieving significant reduction of the ciphertext expansion. In the ...
- ArticleNovember 2011
Cryptanalysis of randomized arithmetic codes based on markov model
Inscrypt'11: Proceedings of the 7th international conference on Information Security and CryptologyPages 341–362https://doi.org/10.1007/978-3-642-34704-7_24An improvement of arithmetic coding based on Markov model ($\textsf{ACMM}$) has been proposed in the paper (Duan L.L., Liao X. F., Xiang T., Communications in Nonlinear Science and Numerical Simulation, 2011, 16(6):2554-2562). Though, a methodology to ...
- articleJuly 2011
Cryptanalysis of simplified-DES using computational intelligence
Cryptanalysis with Computational Intelligence has gained much interest in recent years. This paper presents an approach for breaking the key used in Simplified-Data Encryption Standard (S-DES) using Genetic algorithm (GA), Particle Swarm Optimization (...
- research-articleMarch 2011
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem
IEEE Transactions on Information Theory (ITHR), Volume 57, Issue 3Pages 1780–1785https://doi.org/10.1109/TIT.2010.2103790In 1998, Cai and Cusick proposed a lattice-based public-key cryptosystem based on the similar ideas of the Ajtai-Dwork cryptosystem, but with much less data expansion. However, they didn't give any security proof. In our paper, we present an efficient ...
- ArticleMarch 2010
Perceptual Video Encryption for Multimedia Applications
ICCEA '10: Proceedings of the 2010 Second International Conference on Computer Engineering and Applications - Volume 01Pages 587–589https://doi.org/10.1109/ICCEA.2010.120In this paper, a perceptual encryption algorithm is proposed. The perceptual feature requires that the quality of visual data be partially degraded by encryption. This algorithm selectively encrypts fixed-length code words in video input with three ...
- research-articleMarch 2008
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 18, Issue 3Pages 338–349https://doi.org/10.1109/TCSVT.2008.918116Recently, a new image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed based on two-dimensional discrete prolate spheroidal sequences. A comprehensive cryptanalysis is given here on this image scrambling scheme, showing that ...