Results 21 to 30 of about 6,315,248 (307)
Optimized Implementation of PIPO Block Cipher on 32-Bit ARM and RISC-V Processors
A lightweight block cipher PIPO-64/128 was presented in ICISC’2020. PIPO of the 8-bit unit using an unbalanced-bridge S-box showed better performance than other lightweight block cipher algorithms on an 8-bit AVR environment.
Youngbeom Kim, Seog Chung Seo
doaj +1 more source
In edge computing service, edge devices collect data from a number of embedded devices, like sensors, CCTVs (Closed-circuit Television), and so on, and communicate with application servers.
BoSun Park, Seog Chung Seo
doaj +1 more source
With the advent of IoT and Cloud computing service technology, the size of user data to be managed and file data to be transmitted has been significantly increased.
SangWoo An, Seog Chung Seo
doaj +1 more source
Improved Correlation Power Analysis on Bitslice Block Ciphers
Bitslice block ciphers have the advantage of allowing parallel computation using bitwise logical operations, and Boolean masking can be applied efficiently.
Jaeseung Han +4 more
doaj +1 more source
Swarm Intelligence Algorithms in Text Document Clustering with Various Benchmarks
Text document clustering refers to the unsupervised classification of textual documents into clusters based on content similarity and can be applied in applications such as search optimization and extracting hidden information from data generated by IoT ...
Suganya Selvaraj, Eunmi Choi
doaj +1 more source
Efficient Parallel Implementations of PIPO Block Cipher on CPU and GPU
Data encryption is essential for securely managing clients’ data in servers in data-centric ICT environment. Clients must encrypt the data before transmitting it to severs or other clients. Encrypting a large volumne of data requires a lot of time.
Hojin Choi, Seog Chung Seo
doaj +1 more source
Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File Encryption
XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several studies have been conducted to improve the encryption speed using XTS-AES according to the increasing disk size.
Sangwoo An, Seog Chung Seo
doaj +1 more source
Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium
Shuffling is an essential countermeasure employed during the implementation of cryptographic algorithms to mitigate vulnerabilities against side-channel attacks, regardless of the algorithm’s nature.
Jonghyeok Lee +7 more
doaj +1 more source
Modulated Information Flows in Financial Markets
We model continuous-time information flows generated by a number of information sources that switch on and off at random times. By modulating a multi-dimensional L\'evy random bridge over a random point field, our framework relates the discovery of ...
Hoyle, Edward +2 more
core +1 more source
Financial Information Quality on Liquidity Risk and Cost of Equity [PDF]
The main objective of this study is to investigate the effect of financial information quality on liquidity risk and cost of equity using information of companies listed in the Tehran Stock Exchange.
omid pourheidari, neda bagheri
doaj +1 more source

