A privacy-preserving solution for compressed storage and selective retrieval of genomic data

Z Huang, E Ayday, H Lin, RS Aiyar… - Genome …, 2016 - genome.cshlp.org
In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing
platforms makes it beneficial to store patients' complete aligned genomic data in addition to …

PC-SyncBB: A privacy preserving collusion secure DCOP algorithm

T Tassa, T Grinshpoun, A Yanai - Artificial Intelligence, 2021 - Elsevier
In recent years, several studies proposed privacy-preserving algorithms for solving
Distributed Constraint Optimization Problems (DCOPs). Those studies were based on …

1, 2, 3, fork: Counter mode variants based on a generalized forkcipher

E Andreeva, AS Bhati, B Preneel, D Vizár - Cryptology ePrint Archive, 2021 - eprint.iacr.org
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by
Andreeva et al. at ASIACRYPT'19. An MFC is a tweakable cipher that computes $ s $ output …

System and method for transparent disk encryption

R Danilak - US Patent 8,386,797, 2013 - Google Patents
US PATENT DOCUMENTS(57) ABSTRACT 4.278, 837 A 7, 1981 Best A data storage
system providing transparent encryption. The 5,172,379 A 12/1992 Burrer et al. data storage …

Block cipher using multiplication over a finite field of even characteristic

JP Schneider - US Patent 8,416,947, 2013 - Google Patents
An input block of data and a key that includes multiple sub keys are received by a block
cipher. A nonlinear substitution is performed on at least a portion of the data, wherein the …

Selective encryption of the versatile video coding standard

M Farajallah, G Gautier, W Hamidouche… - IEEE …, 2022 - ieeexplore.ieee.org
versatile video coding (VVC) is the next generation video coding standard developed by the
joint video experts team (JVET) and released in July 2020. VVC introduces several new …

{SecPM}: a Secure and Persistent Memory System for Non-volatile Memory

P Zuo, Y Hua - 10th USENIX Workshop on Hot Topics in Storage and …, 2018 - usenix.org
In the non-volatile memory, ensuring the security and correctness of persistent data is
fundamental. However, the security and persistence issues are usually studied …

Security and practical considerations when implementing the elliptic curve integrated encryption scheme

V Gayoso Martínez, L Hernández Encinas… - Cryptologia, 2015 - Taylor & Francis
The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated
Encryption Scheme (ECIES), which is included in ANSI X9. 63, IEEE 1363a, ISO/IEC 18033 …

Promt: optimizing integrity tree updates for write-intensive pages in secure nvms

M Alwadi, A Mohaisen, A Awad - … of the ACM International Conference on …, 2021 - dl.acm.org
Current computer systems are vulnerable to a wide range of attacks caused by the
proliferation of accelerators, and the fact that current system comprise multiple SoCs …

Nonlinear feedback mode for block ciphers

JP Schneider - US Patent 8,358,781, 2013 - Google Patents
Plaintext, a secret key and a primitive polynomial that defines a finite field of even
characteristic are received. The plain text is divided into a plurality of plain text blocks. For …