![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Design and implementation of low-depth pairing-based homomorphic encryption scheme
Homomorphic encryption allows to carry out operations on encrypted data. In this paper, we focus on the design of a scheme based on pairings and elliptic curves, that is able to handle applications where the n...
-
Article
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
In typical applications of homomorphic encryption, the first step consists for Alice of encrypting some plaintext m under Bob’s public key ...
-
Article
Blue mussel (Mytilus edulis) bouchot culture in Mont-St Michel Bay: potential mitigation effects on climate change and eutrophication
Bivalve production is an important aquaculture activity worldwide, but few environmental assessments have focused on it. In particular, bivalves’ ability to extract nutrients from the environment by intensely ...
-
Chapter and Conference Paper
A Methodology to Assess Vulnerabilities and Countermeasures Impact on the Missions of a Naval System
The paper proposes a methodology to assess the impacts of vulnerabilities, attacks and countermeasures on a vessel’s missions, and a metric designed to express and compare these impacts. A behavioral modeling ...
-
Chapter and Conference Paper
Privacy Preserving Data Classification Using Inner Product Encryption
In the context of data outsourcing more and more concerns raise about the privacy of user’s data. One solution is to outsource the data in encrypted form. Meanwhile obtaining a service based on machine learnin...
-
Chapter and Conference Paper
Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges
The proposed article aims, for readers, to learn about the existing efforts to secure and implement Somewhat/Fully Homomorphic Encryption ((S/F)HE) schemes and the problems to be tackled in order to progress t...
-
Chapter and Conference Paper
A Note on Ring-LWE Security in the Case of Fully Homomorphic Encryption
Evaluating the practical security of Ring-LWE based cryptography has attracted lots of efforts recently. Indeed, some differences from the standard LWE problem enable new attacks. In this paper we discuss the ...
-
Chapter and Conference Paper
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
In typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key ...
-
Chapter and Conference Paper
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes
Active fingerprinting schemes were originally invented to deter malicious users from illegally releasing an item, such as a movie or an image. To achieve this, each time an item is released, a different finger...
-
Reference Work Entry In depth
Self-Synchronizing Stream Cipher
-
Reference Work Entry In depth
SEAL
-
Reference Work Entry In depth
Shrinking Generator
-
Reference Work Entry At a glance
Summation Generator
-
Reference Work Entry In depth
Linear Congruential Generator
-
Reference Work Entry In depth
Synchronous Stream Cipher
-
Reference Work Entry In depth
Nonlinear Feedback Shift Register
-
Reference Work Entry In depth
RC4
-
Chapter and Conference Paper
An Asymmetric Fingerprinting Scheme Based on Tardos Codes
Asymmetric fingerprinting protocols are designed to prevent an untrustworthy Provider incriminating an innocent Buyer. These protocols enable the Buyer to generate their own fingerprint by themself, and ensure...
-
Chapter and Conference Paper
Ensuring Message Embedding in Wet Paper Steganography
Syndrome coding has been proposed by Crandall in 1998 as a method to stealthily embed a message in a cover-medium through the use of bounded decoding. In 2005, Fridrich et al. introduced wet paper codes to improv...
-
Article
Open AccessHow Reed-Solomon Codes Can Improve Steganographic Schemes
The use of syndrome coding in steganographic schemes tends to reduce distortion during embedding. The more complete model comes from the wet papers (J. Fridrich et al., 2005) and allow to lock positions which ...