Results 51 to 60 of about 94,502 (210)

Stronger Security Variants of GCM-SIV

open access: yesIACR Transactions on Symmetric Cryptology, 2016
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated.
Tetsu Iwata, Kazuhiko Minematsu
doaj   +1 more source

Sailing Through Setbacks—What Makes Personal Financial Resilience?

open access: yesAccounting &Finance, EarlyView.
ABSTRACT We investigate financial adaptation by young adults (18 to 40 years old) during a recent cost‐of‐living crisis in a developed economy. Interview, financial, demographic and psychographic data are brought together to shed new light on personal financial resilience, or the capacity to adapt to financial shocks.
Syed Shah   +2 more
wiley   +1 more source

Understanding Family Dynamics in Mixed‐Status Families: A Qualitative Interpretive Meta‐Synthesis

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT In the United States, mixed‐status families, where at least one member lacks legal immigration status, face persistent challenges related to deportation, which disrupt family stability, influence parental practices and impact children's identity formation.
Maryam Rafieifar   +2 more
wiley   +1 more source

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n.
Tetsu Iwata   +3 more
doaj   +1 more source

Divorcescapes: Family Conflicts and Children's Lived Spaces

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT This article presents an analysis from a project that focuses on the entanglements that emerge between practices within the family law system and the everyday lives of children in conflictual family law cases. We position our analysis in critical childhood studies and zoom in on the social–spatial dimensions of children's everyday lives by ...
Hanne Warming, Sarah Alminde
wiley   +1 more source

Behind the Curtain: COVID‐19 as a Lens to Precarity in Museum Labor

open access: yesCurator: The Museum Journal, EarlyView.
ABSTRACT Using in‐depth interviews with emerging and early professional museum workers in New Orleans, Louisiana, this article expands on scholarship around the perceived and actual value of nonprofit labor. It adds qualitative support to the argument that museum labor is real labor—open to exploitation and abuse while constantly negotiated internally ...
Miriam Taylor Fair
wiley   +1 more source

The new poor law and the health of the population of England and Wales

open access: yesThe Economic History Review, EarlyView.
Abstract We estimate the impact of reductions in poor law expenditure on rural life expectancy and mortality rates in England and Wales following the 1834 Poor Law Amendment Act. Given the scale of cuts imposed, our estimates imply 8–10 per cent increases in mortality at ages 1–4 years and 2–4 per cent falls in rural expectation of life at birth.
David Green   +3 more
wiley   +1 more source

The prevalence of envelope wages in the Baltic Sea region [PDF]

open access: yes, 2009
Purpose - The purpose of this paper is to evaluate in the Baltic Sea region the prevalence of an illegitimate wage arrangement whereby formal employers pay their formal employees both an official declared wage as well as a supplementary undeclared ...
Williams, C.C.
core   +1 more source

Thriving or sinking? The emplacement process of Ukrainian refugees in depopulating, peripheral areas in the Netherlands

open access: yesThe Geographical Journal, EarlyView.
Short Abstract The ‘free‐to‐work, free‐to‐settle’ feature of the EU's temporary protection for Ukrainian refugees has led millions to various locations, with the majority gravitating towards urban areas. However, due to housing shortages, a significant number have moved to peripheral municipalities experiencing depopulation.
Jofelle Tesorio
wiley   +1 more source

Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier

open access: yesJournal of Mathematical Cryptology, 2016
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions.
Moody Dustin   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy