Results 21 to 30 of about 1,275,223 (320)
We present column parity mixers (CPM), a generalization of the Θ mixing layer that is used in Keccak. Thanks to our description using matrix arithmetic, we can easily derive algebraic, diffusion, and mask propagation properties, leading to a surprising ...
Ko Stoffelen, Joan Daemen
doaj +1 more source
A novel single-crystal & single-pass source for polarisation- and colour-entangled photon pairs
We demonstrate a new generation mechanism for polarisation- and colour-entangled photon pairs. In our approach we tailor the phase-matching of a periodically poled KTP crystal such that two downconversion processes take place simultaneously.
Fabian Laudenbach+4 more
doaj +1 more source
Recent developments enable biometric recognition systems to be available as mobile solutions or to be even integrated into modern smartphone devices. Thus, smartphone devices can be used as mobile fingerprint image acquisition devices, and it has become ...
Christof Kauba+6 more
doaj +1 more source
Under false flag: using technical artifacts for cyber attack attribution
The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is
Florian Skopik, Timea Pahi
doaj +1 more source
Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT,
Kyounggon Kim+5 more
doaj +1 more source
The Subterranean 2.0 Cipher Suite
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
Joan Daemen+3 more
doaj +1 more source
Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain [PDF]
The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness.
Dimkov, T., Hartel, P.H., Pieters, W.
core +6 more sources
Digital Age Security Threats: Challenges to IR Theories [PDF]
The significance of information and communication technology (ICT) has been widely felt not only within a state but also among and between the states in their multifarious day-to-day interactions.
Gaan, N. (Narottam)
core +1 more source
Security analysis of the W-OTS$^+$ signature scheme: Updating security bounds [PDF]
In this work, we discuss in detail a flaw in the original security proof of the W-OTS${^+}$ variant of the Winternitz one-time signature scheme, which is an important component for various stateless and stateful many-time hash-based digital signature schemes.
arxiv +1 more source
DIGITAL SKILLS – AN ASSET FOR FUTURE ACCOUNTING PROFESSIONALS. ANALYSIS OF ROMANIA’S POSITIONING WITHIN THE EU MEMBER STATES [PDF]
Globalisation, digitisation and technological advances describe the present and future of accounting. In order for accounting professionals to remain always connected to the present and prepared for the future, they constantly need to update their ...
Veronica MÎȚA, Mariana MAN
doaj +1 more source