Demonstrates a combination of 2D-Discrete Wavelet Transform (2D-DWT) with post-quantum cryptographic techniques, including a simulated version of the Falcon signature algorithm, for securing images.
verification aes-encryption decryption post-quantum-cryptography lwe-encryption 2d-dwt simulated-falcon-signing lattice-signatures
-
Updated
Sep 4, 2024 - Jupyter Notebook