Results 21 to 30 of about 6,315,248 (307)

Optimized Implementation of PIPO Block Cipher on 32-Bit ARM and RISC-V Processors

open access: yesIEEE Access, 2022
A lightweight block cipher PIPO-64/128 was presented in ICISC’2020. PIPO of the 8-bit unit using an unbalanced-bridge S-box showed better performance than other lightweight block cipher algorithms on an 8-bit AVR environment.
Youngbeom Kim, Seog Chung Seo
doaj   +1 more source

Efficient Implementation of NIST LWC ESTATE Algorithm Using OpenCL and Web Assembly for Secure Communication in Edge Computing Environment

open access: yesSensors, 2021
In edge computing service, edge devices collect data from a number of embedded devices, like sensors, CCTVs (Closed-circuit Television), and so on, and communicate with application servers.
BoSun Park, Seog Chung Seo
doaj   +1 more source

Highly Efficient Implementation of Block Ciphers on Graphic Processing Units for Massively Large Data

open access: yesApplied Sciences, 2020
With the advent of IoT and Cloud computing service technology, the size of user data to be managed and file data to be transmitted has been significantly increased.
SangWoo An, Seog Chung Seo
doaj   +1 more source

Improved Correlation Power Analysis on Bitslice Block Ciphers

open access: yesIEEE Access, 2022
Bitslice block ciphers have the advantage of allowing parallel computation using bitwise logical operations, and Boolean masking can be applied efficiently.
Jaeseung Han   +4 more
doaj   +1 more source

Swarm Intelligence Algorithms in Text Document Clustering with Various Benchmarks

open access: yesSensors, 2021
Text document clustering refers to the unsupervised classification of textual documents into clusters based on content similarity and can be applied in applications such as search optimization and extracting hidden information from data generated by IoT ...
Suganya Selvaraj, Eunmi Choi
doaj   +1 more source

Efficient Parallel Implementations of PIPO Block Cipher on CPU and GPU

open access: yesIEEE Access, 2022
Data encryption is essential for securely managing clients’ data in servers in data-centric ICT environment. Clients must encrypt the data before transmitting it to severs or other clients. Encrypting a large volumne of data requires a lot of time.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File Encryption

open access: yesIEEE Access, 2022
XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several studies have been conducted to improve the encryption speed using XTS-AES according to the increasing disk size.
Sangwoo An, Seog Chung Seo
doaj   +1 more source

Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium

open access: yesIEEE Access, 2023
Shuffling is an essential countermeasure employed during the implementation of cryptographic algorithms to mitigate vulnerabilities against side-channel attacks, regardless of the algorithm’s nature.
Jonghyeok Lee   +7 more
doaj   +1 more source

Modulated Information Flows in Financial Markets

open access: yes, 2020
We model continuous-time information flows generated by a number of information sources that switch on and off at random times. By modulating a multi-dimensional L\'evy random bridge over a random point field, our framework relates the discovery of ...
Hoyle, Edward   +2 more
core   +1 more source

Financial Information Quality on Liquidity Risk and Cost of Equity [PDF]

open access: yesراهبرد مدیریت مالی, 2013
The main objective of this study is to investigate the effect of financial information quality on liquidity risk and cost of equity using information of companies listed in the Tehran Stock Exchange.
omid pourheidari, neda bagheri
doaj   +1 more source

Home - About - Disclaimer - Privacy