Classification of 4-bit S-Boxes for BOGI Permutation
Bad Output must go to Good Input (BOGI) is the primary design strategy of GIFT, a lightweight block cipher that was presented at CHES 2017. Because this strategy obviates the need to adhere to the required conditions of S-boxes when adopting bit ...
Seonggyeom Kim+3 more
doaj +1 more source
Context-aware Data Aggregation with Localized Information Privacy [PDF]
In this paper, localized information privacy (LIP) is proposed, as a new privacy definition, which allows statistical aggregation while protecting users’ privacy without relying on a trusted third party. The notion of context-awareness is incorporated in
Bo Jiang, Ming Li, R. Tandon
semanticscholar +1 more source
Privacy and artificial intelligence: challenges for protecting health information in a new era
Advances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could
Blake Murdoch
semanticscholar +1 more source
Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the ...
Na Young Ahn+3 more
doaj +1 more source
Gamification vs. Privacy: Identifying and Analysing the Major Concerns
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains.
Aikaterini-Georgia Mavroeidi+3 more
doaj +1 more source
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms.
Yongseong Lee+3 more
doaj +1 more source
Decentralized Detection With Robust Information Privacy Protection [PDF]
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest. However, the raw sensor observations also allow the fusion center to infer private hypotheses that we wish to protect.
Meng Sun, Wee Peng Tay
semanticscholar +1 more source
Bounded-Leakage Differential Privacy [PDF]
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for mechanisms that leak some additional, bounded information about the database.
Ligett, Katrina+2 more
core +1 more source
Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial ...
Marc Jofre+6 more
doaj +1 more source
Differential Privacy: on the trade-off between Utility and Information Leakage [PDF]
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent ...
Alvim, Mário S.+4 more
core +6 more sources