Search Results - "Partala, Juha"

Refine Results
  1. 1

    Provably Secure Covert Communication on Blockchain by Partala, Juha

    Published in Cryptography (01-09-2018)
    “…Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing…”
    Get full text
    Journal Article
  2. 2

    Indifferentiable hash functions in the standard model by Partala, Juha

    Published in IET information security (01-07-2021)
    “…Indifferentiability of iterated hash functions is seen as evidence that there are no structural flaws in the iteration structure of the algorithm. However, it…”
    Get full text
    Journal Article
  3. 3

    Algebraic generalization of Diffie–Hellman key exchange by Partala Juha

    Published in Journal of mathematical cryptology (01-03-2018)
    “…The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primitives. Its underlying algebraic structure is a cyclic group…”
    Get full text
    Journal Article
  4. 4

    Non-Interactive Zero-Knowledge for Blockchain: A Survey by Partala, Juha, Nguyen, Tri Hong, Pirttikangas, Susanna

    Published in IEEE access (2020)
    “…We survey the state-of-the-art non-interactive zero-knowledge argument schemes and their applications in confidential transactions and private smart contracts…”
    Get full text
    Journal Article
  5. 5

    Symmetric Blind Decryption with Perfect Secrecy by Partala, Juha

    “…A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plain-text message. Such schemes…”
    Get full text
    Journal Article
  6. 6

    Improving Robustness of Biometric Identity Determination with Digital Watermarking by Keskinarkaus, Anja, Pramila, Anu, Fylakis, Angelos, Partala, Juha, Seppänen, Tapio

    “…The determination of an identity from noisy biometric measurements is a continuing challenge. In many applications, such as identity-based encryption, the…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage by Partala, Juha

    Published in Security and communication networks (01-01-2017)
    “…A distributed storage system (DSS) is a fundamental building block in many distributed applications. It applies linear network coding to achieve an optimal…”
    Get full text
    Journal Article
  9. 9

    Threat modeling AI/ML with the Attack Tree by Hoseini, Seied veria, Suutala, Jaakko, Partala, Juha, Halunen, Kimmo

    Published in IEEE access (12-11-2024)
    “…The pervasive use of AI assistant systems and machine learning-based applications in various fields and everyday life has significantly shifted. However, this…”
    Get full text
    Journal Article
  10. 10

    Blockchain-Based Mobility-as-a-Service by Nguyen, Tri Hong, Partala, Juha, Pirttikangas, Susanna

    “…In this paper, we present a vision for a blockchain-based Mobility-as-a-Service (MaaS) as an application of edge computing. In current MaaS systems, a central…”
    Get full text
    Conference Proceeding
  11. 11

    Reversible Data Hiding in FTIR Microspectroscopy Images with Tamper Indication and Payload Error Correction by Saarakkala, Simo, Partala, Juha, Keskinarkaus, Anja, Fylakis, Angelos, Seppänen, Tapio

    Published in BioMed research international (01-01-2017)
    “…Fourier transform infrared (FTIR) microspectroscopy images contain information from the whole infrared spectrum used for microspectroscopic analyses. In…”
    Get full text
    Journal Article
  12. 12

    Privacy-Aware Blockchain Innovation for 6G: Challenges and Opportunities by Nguyen, Tri, Tran, Ngoc, Loven, Lauri, Partala, Juha, Kechadi, M-Tahar, Pirttikangas, Susanna

    Published in 2020 2nd 6G Wireless Summit (6G SUMMIT) (01-03-2020)
    “…6G wireless networks improve on 5G by further increasing reliability, speeding up the networks and increasing the available bandwidth. These evolutionary…”
    Get full text
    Conference Proceeding
  13. 13

    Computationally Efficient Early Prognosis of the Outcome of Comatose Cardiac Arrest Survivors Using Slow-Wave Activity Features in EEG by Salminen, Miikka, Partala, Juha, Vayrynen, Eero, Kortelainen, Jukka

    Published in 2023 Computing in Cardiology (CinC) (01-10-2023)
    “…This study, part of 'Predicting Neurological Recovery from Coma After Cardiac Arrest: The George B. Moody PhysioNet Challenge 2023', evaluated a…”
    Get full text
    Conference Proceeding
  14. 14

    Symmetric Blind Decryption with Perfect Secrecy by Partala, Juha

    Published 21-10-2015
    “…A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plaintext message. Such schemes…”
    Get full text
    Journal Article
  15. 15

    On the conjugacy search problem and left conjugacy closed loops by Partala, Juha, Seppänen, Tapio

    “…The conjugacy search problem (CSP) is used as a primitive in several braid group-based public key encryption schemes. It has been pointed out that, in braid…”
    Get full text
    Journal Article
  16. 16

    Situation Awareness for Autonomous Vehicles Using Blockchain-based Service Cooperation by Nguyen, Huong, Nguyen, Tri, Leppänen, Teemu, Partala, Juha, Pirttikangas, Susanna

    Published 07-04-2022
    “…Efficient Vehicle-to-Everything enabling cooperation and enhanced decision-making for autonomous vehicles is essential for optimized and safe traffic…”
    Get full text
    Journal Article
  17. 17

    A note on conjugacy search and racks by Partala, Juha

    Published 10-11-2009
    “…We show that for every effective left conjugacy closed left quasigroup, there is an induced rack that retains the conjugation structure of the left…”
    Get full text
    Journal Article
  18. 18
  19. 19
  20. 20

    Security threats against the transmission chain of a medical health monitoring system by Partala, Juha, Keraneny, Niina, Sarestoniemi, Mariella, Hamalainen, Matti, Iinatti, Jari, Jamsa, Timo, Reponen, Jarmo, Seppanen, Tapio

    “…One of the most important aspects of a wireless health monitoring system is the security of data. In this paper, security attacks against the complete…”
    Get full text
    Conference Proceeding