Results 1 to 10 of about 3,894,133 (310)

The impact of disability on employment and financial security following the outbreak of the 2020 COVID-19 pandemic in the UK. [PDF]

open access: yesJ Public Health (Oxf), 2021
Background The coronavirus disease 2019 (COVID-19) pandemic may have a greater impact on people with disabilities than non-disabled people. Our aim was to compare the short-term impact of the 2020 COVID-19 pandemic and first lockdown on the employment ...
Emerson E   +7 more
europepmc   +2 more sources

Advanced financial security system using smart contract in private ethereum consortium blockchain with hybrid optimization strategy. [PDF]

open access: yesSci Rep
In traditional stock market, the global processing framework shares the data to various mediators like financial and government institutions. The institutional firms needs to handle with large number of data in the system and cooperates with others to ...
Prabanand SC, Thanabal MS.
europepmc   +2 more sources

Financial Security at Older Ages [PDF]

open access: yesInnov Aging, 2020
Abstract As Americans have become increasingly indebted over time, understanding the factors influencing indebtedness is increasingly important and can help policymakers design policies that discourage debt, thus enhancing private retirement savings so that retirees become less dependent on Social Security benefits.
Mudrazija S, Butrica B.
europepmc   +3 more sources

High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A

open access: yesIEEE Access, 2021
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song   +2 more
doaj   +1 more source

Accelerating Falcon on ARMv8

open access: yesIEEE Access, 2022
Falcon is one of the promising digital-signature algorithms in NIST’s ongoing Post-Quantum Cryptography (PQC) standardization finalist. Computational efficiency regarding software and hardware is also the main criteria for PQC standardization.
Youngbeom Kim   +2 more
doaj   +1 more source

Accelerated implementation for testing IID assumption of NIST SP 800-90B using GPU [PDF]

open access: yesPeerJ Computer Science, 2021
In cryptosystems and cryptographic modules, insufficient entropy of the noise sources that serve as the input into random number generator (RNG) may cause serious damage, such as compromising private keys.
Yewon Kim, Yongjin Yeom
doaj   +2 more sources

Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium

open access: yesIEEE Access, 2023
Shuffling is an essential countermeasure employed during the implementation of cryptographic algorithms to mitigate vulnerabilities against side-channel attacks, regardless of the algorithm’s nature.
Jonghyeok Lee   +7 more
doaj   +1 more source

Deep-Learning Based Nonprofiling Side-Channel Attack on Mask Leakage-Free Environments Using Broadcast Operation

open access: yesIEEE Access, 2023
With the recent development of artificial intelligence (AI), efforts to apply related technologies to various fields are rapidly increasing. In the field of cryptanalysis, research utilizing deep learning is continuously being published in order to keep ...
Seonghyuck Lim   +2 more
doaj   +1 more source

Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation

open access: yesIEEE Access, 2022
Recently, as deep learning has been applied to various fields, deep-learning-based side-channel analysis (SCA) has been widely investigated. Unlike traditional SCA, it can perform well independently of the attacker’s ability.
Ji-Eun Woo, Jaeseung Han, Dong-Guk Han
doaj   +1 more source

Single-Byte Error-Based Practical Differential Fault Attack on Bit-Sliced Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy