Results 11 to 20 of about 114,269 (316)

Security and Independence of Process Safety and Control Systems in the Petroleum Industry

open access: yesJournal of Cybersecurity and Privacy, 2022
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus   +8 more
doaj   +1 more source

Practical Evaluation of Protected Residue Number System Scalar Multiplication

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The Residue Number System (RNS) arithmetic is gaining grounds in public key cryptography, because it offers fast, efficient and secure implementations over large prime fields or rings of integers.
Louiza Papachristodoulou   +3 more
doaj   +1 more source

DIGITAL SKILLS – AN ASSET FOR FUTURE ACCOUNTING PROFESSIONALS. ANALYSIS OF ROMANIA’S POSITIONING WITHIN THE EU MEMBER STATES [PDF]

open access: yesAnnals of the University of Oradea: Economic Science, 2023
Globalisation, digitisation and technological advances describe the present and future of accounting. In order for accounting professionals to remain always connected to the present and prepared for the future, they constantly need to update their ...
Veronica MÎȚA, Mariana MAN
doaj   +1 more source

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In this
Joan Daemen   +2 more
doaj   +1 more source

Column Parity Mixers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
We present column parity mixers (CPM), a generalization of the Θ mixing layer that is used in Keccak. Thanks to our description using matrix arithmetic, we can easily derive algebraic, diffusion, and mask propagation properties, leading to a surprising ...
Ko Stoffelen, Joan Daemen
doaj   +1 more source

Calibrating the Attack to Sensitivity in Differentially Private Mechanisms

open access: yesJournal of Cybersecurity and Privacy, 2022
This work studies the power of adversarial attacks against machine learning algorithms that use differentially private mechanisms as their weapon.
Ayşe Ünsal, Melek Önen
doaj   +1 more source

A novel single-crystal & single-pass source for polarisation- and colour-entangled photon pairs

open access: yesScientific Reports, 2017
We demonstrate a new generation mechanism for polarisation- and colour-entangled photon pairs. In our approach we tailor the phase-matching of a periodically poled KTP crystal such that two downconversion processes take place simultaneously.
Fabian Laudenbach   +4 more
doaj   +1 more source

Towards Using Police Officers’ Business Smartphones for Contactless Fingerprint Acquisition and Enabling Fingerprint Comparison against Contact-Based Datasets

open access: yesSensors, 2021
Recent developments enable biometric recognition systems to be available as mobile solutions or to be even integrated into modern smartphone devices. Thus, smartphone devices can be used as mobile fingerprint image acquisition devices, and it has become ...
Christof Kauba   +6 more
doaj   +1 more source

Digital Watermarking Security

open access: yesDefence Science Journal, 2011
<p>As creative works (e.g. books, films, music, photographs) become increasingly available in digital formats in a highly connected world, it also becomes increasingly difficult to secure intellectual property rights. Digital watermarking is one potential technology to aid intellectual property owners in controlling and tracking the use of their ...
Blake, Jonathan, Latifi, Shahram
openaire   +2 more sources

The Subterranean 2.0 Cipher Suite

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
Joan Daemen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy