Results 1 to 10 of about 3,894,133 (310)
The impact of disability on employment and financial security following the outbreak of the 2020 COVID-19 pandemic in the UK. [PDF]
Background The coronavirus disease 2019 (COVID-19) pandemic may have a greater impact on people with disabilities than non-disabled people. Our aim was to compare the short-term impact of the 2020 COVID-19 pandemic and first lockdown on the employment ...
Emerson E +7 more
europepmc +2 more sources
Advanced financial security system using smart contract in private ethereum consortium blockchain with hybrid optimization strategy. [PDF]
In traditional stock market, the global processing framework shares the data to various mediators like financial and government institutions. The institutional firms needs to handle with large number of data in the system and cooperates with others to ...
Prabanand SC, Thanabal MS.
europepmc +2 more sources
Financial Security at Older Ages [PDF]
Abstract As Americans have become increasingly indebted over time, understanding the factors influencing indebtedness is increasingly important and can help policymakers design policies that discourage debt, thus enhancing private retirement savings so that retirees become less dependent on Social Security benefits.
Mudrazija S, Butrica B.
europepmc +3 more sources
High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song +2 more
doaj +1 more source
Falcon is one of the promising digital-signature algorithms in NIST’s ongoing Post-Quantum Cryptography (PQC) standardization finalist. Computational efficiency regarding software and hardware is also the main criteria for PQC standardization.
Youngbeom Kim +2 more
doaj +1 more source
Accelerated implementation for testing IID assumption of NIST SP 800-90B using GPU [PDF]
In cryptosystems and cryptographic modules, insufficient entropy of the noise sources that serve as the input into random number generator (RNG) may cause serious damage, such as compromising private keys.
Yewon Kim, Yongjin Yeom
doaj +2 more sources
Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium
Shuffling is an essential countermeasure employed during the implementation of cryptographic algorithms to mitigate vulnerabilities against side-channel attacks, regardless of the algorithm’s nature.
Jonghyeok Lee +7 more
doaj +1 more source
With the recent development of artificial intelligence (AI), efforts to apply related technologies to various fields are rapidly increasing. In the field of cryptanalysis, research utilizing deep learning is continuously being published in order to keep ...
Seonghyuck Lim +2 more
doaj +1 more source
Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation
Recently, as deep learning has been applied to various fields, deep-learning-based side-channel analysis (SCA) has been widely investigated. Unlike traditional SCA, it can perform well independently of the attacker’s ability.
Ji-Eun Woo, Jaeseung Han, Dong-Guk Han
doaj +1 more source
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim +2 more
doaj +1 more source

