Skip to main content

Showing 1–5 of 5 results for author: Karabina, K

.
  1. arXiv:2307.01923  [pdf, other

    cs.CR math.AT

    An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

    Authors: Dominic Gold, Koray Karabina, Francis C. Motta

    Abstract: Topological Data Analysis (TDA) offers a suite of computational tools that provide quantified shape features in high dimensional data that can be used by modern statistical and predictive machine learning (ML) models. In particular, persistent homology (PH) takes in data (e.g., point clouds, images, time series) and derives compact representations of latent topological structures, known as persist… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    MSC Class: 68P25 (Primary); 55N31 (Secondary) ACM Class: G.4.0; E.3.2

  2. arXiv:2209.09102  [pdf, other

    cs.CV cs.LG

    Improving Accuracy and Explainability of Online Handwriting Recognition

    Authors: Hilda Azimi, Steven Chang, Jonathan Gold, Koray Karabina

    Abstract: Handwriting recognition technology allows recognizing a written text from a given data. The recognition task can target letters, symbols, or words, and the input data can be a digital image or recorded by various sensors. A wide range of applications from signature verification to electronic document processing can be realized by implementing efficient and accurate handwriting recognition algorith… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Comments: 20 pages, 8 figures, 2 tables,

  3. arXiv:2103.05792  [pdf, other

    cs.CR cs.DB

    Equi-Joins Over Encrypted Data for Series of Queries

    Authors: Masoumeh Shafieinejad, Suraj Gupta, Jin Yang Liu, Koray Karabina, Florian Kerschbaum

    Abstract: Encryption provides a method to protect data outsourced to a DBMS provider, e.g., in the cloud. However, performing database operations over encrypted data requires specialized encryption schemes that carefully balance security and performance. In this paper, we present a new encryption scheme that can efficiently perform equi-joins over encrypted data with better security than the state-of-the-ar… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Comments: 13 pages, 4 figures, 6 tables

  4. arXiv:1910.01389  [pdf, other

    cs.CR cs.CV

    A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing

    Authors: Kevin Atighehchi, Loubna Ghammam, Koray Karabina, Patrick Lacharme

    Abstract: Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy in matching. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random… ▽ More

    Submitted 17 January, 2020; v1 submitted 3 October, 2019; originally announced October 2019.

    Comments: Some revisions and addition of acknowledgements

  5. arXiv:1504.02347  [pdf, ps, other

    cs.CR math.NT

    Point Decomposition Problem in Binary Elliptic Curves

    Authors: Koray Karabina

    Abstract: We analyze the point decomposition problem (PDP) in binary elliptic curves. It is known that PDP in an elliptic curve group can be reduced to solving a particular system of multivariate non-linear system of equations derived from the so called Semaev summation polynomials. We modify the underlying system of equations by introducing some auxiliary variables. We argue that the trade-off between lowe… ▽ More

    Submitted 18 April, 2015; v1 submitted 9 April, 2015; originally announced April 2015.