Results 21 to 30 of about 1,275,223 (320)

Column Parity Mixers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
We present column parity mixers (CPM), a generalization of the Θ mixing layer that is used in Keccak. Thanks to our description using matrix arithmetic, we can easily derive algebraic, diffusion, and mask propagation properties, leading to a surprising ...
Ko Stoffelen, Joan Daemen
doaj   +1 more source

A novel single-crystal & single-pass source for polarisation- and colour-entangled photon pairs

open access: yesScientific Reports, 2017
We demonstrate a new generation mechanism for polarisation- and colour-entangled photon pairs. In our approach we tailor the phase-matching of a periodically poled KTP crystal such that two downconversion processes take place simultaneously.
Fabian Laudenbach   +4 more
doaj   +1 more source

Towards Using Police Officers’ Business Smartphones for Contactless Fingerprint Acquisition and Enabling Fingerprint Comparison against Contact-Based Datasets

open access: yesSensors, 2021
Recent developments enable biometric recognition systems to be available as mobile solutions or to be even integrated into modern smartphone devices. Thus, smartphone devices can be used as mobile fingerprint image acquisition devices, and it has become ...
Christof Kauba   +6 more
doaj   +1 more source

Under false flag: using technical artifacts for cyber attack attribution

open access: yesCybersecurity, 2020
The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is
Florian Skopik, Timea Pahi
doaj   +1 more source

Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey

open access: yesSensors, 2023
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT,
Kyounggon Kim   +5 more
doaj   +1 more source

The Subterranean 2.0 Cipher Suite

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
Joan Daemen   +3 more
doaj   +1 more source

Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain [PDF]

open access: yes, 2009
The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness.
Dimkov, T., Hartel, P.H., Pieters, W.
core   +6 more sources

Digital Age Security Threats: Challenges to IR Theories [PDF]

open access: yes, 2016
The significance of information and communication technology (ICT) has been widely felt not only within a state but also among and between the states in their multifarious day-to-day interactions.
Gaan, N. (Narottam)
core   +1 more source

Security analysis of the W-OTS$^+$ signature scheme: Updating security bounds [PDF]

open access: yesMat. Vopr. Kriptogr. 12, 129 (2021), 2020
In this work, we discuss in detail a flaw in the original security proof of the W-OTS${^+}$ variant of the Winternitz one-time signature scheme, which is an important component for various stateless and stateful many-time hash-based digital signature schemes.
arxiv   +1 more source

DIGITAL SKILLS – AN ASSET FOR FUTURE ACCOUNTING PROFESSIONALS. ANALYSIS OF ROMANIA’S POSITIONING WITHIN THE EU MEMBER STATES [PDF]

open access: yesAnnals of the University of Oradea: Economic Science, 2023
Globalisation, digitisation and technological advances describe the present and future of accounting. In order for accounting professionals to remain always connected to the present and prepared for the future, they constantly need to update their ...
Veronica MÎȚA, Mariana MAN
doaj   +1 more source

Home - About - Disclaimer - Privacy