scispace - formally typeset
Search or ask a question

Answers from top 9 papers

More filters
Papers (9)Insight
Proceedings ArticleDOI
C.J. Kuo, M.S. Chen 
01 Oct 1991
39 Citations
This type of signal encryption does not increase redundancy in the signal, which resolves the dilemma between data compression and encryption because the compression efficiency of the encrypted signal is increased.
Thus, more signals can be processed (successfully encrypted and decrypted), no matter they are correlative, sparse, or Gaussian.
In other words, more important data will be encrypted with more secure encryption algorithm and larger key sizes, while less important data might even not be encrypted.
It provides high computational security against passive eavesdroppers in the physical level, because each signal frame is encrypted by a different key.
Even if the eavesdropper intercepts more signal power than the legitimate receiver, secure communication (up to Gb/s) can still be achievable.
In other words, encrypted computing does not compromise the encryption.
Open accessProceedings ArticleDOI
16 Sep 2007
41 Citations
If a signal is decrypted before transcoding and re-encrypted, this may lead to a security loophole.
Open accessProceedings ArticleDOI
15 Apr 2014-Signal Processing
17 Citations
Nevertheless, using encrypted messages have a significant disadvantage.
Therefore, the encrypted transmitted signal will be received with some amount of error.