搜索结果: 1-15 共查到“知识库 h-transform”相关记录276条 . 查询时间(0.04 秒)
More Practical Single-Trace Attacks on the Number Theoretic Transform
side-channel attacks post-quantum cryptography lattice-based cryptography
2019/7/15
Single-trace side-channel attacks are a considerable threat to implementations of classic public-key schemes. For lattice-based cryptography, however, this class of attacks is much less understood, an...
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Fault Attack Block Cipher Masking
2019/5/23
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
BUILT-UP AREA DETECTION FROM HIGH-RESOLUTION SATELLITE IMAGES USING MULTI-SCALE WAVELET TRANSFORM AND LOCAL SPATIAL STATISTICS
Built-up Area Detection High-resolution Satellite Image Wavelet Transform Local Spatial Statistics
2018/5/11
Recently, built-up area detection from high-resolution satellite images (HRSI) has attracted increasing attention because HRSI can provide more detailed object information. In this paper, multi-resolu...
GF-3 SAR IMAGE DESPECKLING BASED ON THE IMPROVED NON-LOCAL MEANS USING NON-SUBSAMPLED SHEARLET TRANSFORM
GF-3 SAR non-subsampled Shearlet transform image despeckling improved Non-Local Means
2018/5/15
GF-3 synthetic aperture radar (SAR) images are rich in information and have obvious sparse features. However, the speckle appears in the GF-3 SAR images due to the coherent imaging system and it hinde...
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Correlation-immune Fourier-Hadamard transform Low Hamming weight
2018/1/27
The correlation immunity of Boolean functions is a property related to cryptography, to error correcting codes, to orthogonal arrays (in combinatorics, which was also a domain of interest of S. Golomb...
The Number Theoretic Transform (NTT) is the time critical function required by cryptographic protocols based on the Ring Learning With Errors problem (RLWE),a popular choice for post-quantum cryptogra...
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
secret-key cryptography known APN functions
2017/6/6
For every positive integers nn, mm and every even positive integer δδ, we derive inequalities satisfied by the Walsh transforms of all vectorial (n,m)(n,m)-functions and prove that the case of equalit...
CONTENT PRESERVING WATERMARKING FOR MEDICAL IMAGES USING SHEARLET TRANSFORM AND SVD
Watermarking Medical images Shearlet transform SVD
2017/6/19
Medical Image Watermarking (MIW) is a special field of a watermarking due to the requirements of the Digital Imaging and COmmunications in Medicine (DICOM) standard since 1993. All 20 parts of the DIC...
Dispersed Cryptography and the Quotient Ring Transform
cryptographic dispersal threshold cryptography foundations
2017/2/21
This paper describes a radically different privacy, security and integrity solution. Dispersed Cryptography converts the cloud from a security threat into a security asset by combining a standard stre...
REMOTE SENSING IMAGE FUSION USING ICA AND OPTIMIZED WAVELET TRANSFORM
remote sensing data fusion multispectral image ICA wavelet transform
2016/11/23
In remote-sensing image processing, fusion (pan-sharpening) is a process of merging high-resolution panchromatic and lower resolution multispectral (MS) imagery to create a single high-resolution colo...
DETECTION OF ORTHOIMAGE MOSAICKING SEAMLINES BY MEANS OF WAVELET TRANSFORM
Orthoimage Seamline Orthomosaic Wavelet transform Undecimated DWT Cost analysis
2016/11/8
The detection of orthoimage mosaicking seamlines by means of wavelet transform was examined. Radiometric alignment was omitted, giving priority to the issue of seamlines which bypass locations where t...
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography
Post-quantum cryptography number theoretic transform (NTT) ring learning with errors (R-LWE)
2016/5/24
The Number Theoretic Transform (NTT) provides efficient algorithms for cyclic and nega-cyclic convolutions, which have many applications in computer arithmetic, e.g., for multiplying large integers an...
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
(Sparse) Walsh-Hadamard Transform Linear cryptanalysis Bias analysis
2016/5/3
Walsh-Hadamard transform is used in a wide variety of scientific and engineering applications, including bent functions and cryptanalytic optimization techniques in cryptography. In linear cryptanalys...
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
zero knowledge Sigma protocols Fiat-Shamir
2016/1/7
In this short paper, we present a Fiat-Shamir type transform that takes any Sigma protocol
for a relation R and outputs a non-interactive zero-knowledge proof (not of knowledge) for the
associated l...
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
Public-key cryptosystem Multivariate PKC Code-based PKC
2016/1/7
In this short paper, we present a Fiat-Shamir type transform that takes any Sigma protocol
for a relation R and outputs a non-interactive zero-knowledge proof (not of knowledge) for the
associated l...