Results 11 to 20 of about 3,894,133 (310)
Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation
The substitution box (S-box) is one of the major components of cryptographic algorithms. An important issue for cryptographic algorithm designers in ensuring sufficient security from linear cryptanalysis, one of the most powerful attacks, is finding an S-
Giyoon Kim, Yongjin Jeon, Jongsung Kim
doaj +1 more source
Generating Cryptographic S-Boxes Using the Reinforcement Learning
Substitution boxes (S-boxes) are essential components of many cryptographic primitives. The Dijkstra algorithm, SAT solvers, and heuristic methods have been used to find bitsliced implementations of S-boxes.
Giyoon Kim +4 more
doaj +1 more source
In the contemporary landscape of rapidly evolving technological advancements and the increasing prevalence of cyber threats, organizations face a critical imperative to align their accounting practices with robust cybersecurity measures.
Samuel Onimisi Dawodu +5 more
semanticscholar +1 more source
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition
Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased.
Seonghyuck Lim +2 more
doaj +1 more source
Advancing the model of social entrepreneurial intention: the role of perceived financial security
PurposeAlthough few studies indicate that financial concerns matter to social entrepreneurs, the literature is unclear about the extent to which a financial motive affects the intention to start a new social enterprise.
Minhajul Islam Ukil +2 more
semanticscholar +1 more source
This paper reports a study aimed at determining the features of using information protection systems at financial institutions in order to improve the level of financial security.
S. Onyshchenko +3 more
semanticscholar +1 more source
Efficient Parallel Implementation of CTR Mode of ARX-Based Block Ciphers on ARMv8 Microcontrollers
With the advancement of 5G mobile telecommunication, various IoT (Internet of Things) devices communicate massive amounts of data by being connected to wireless networks.
JinGyo Song, Seog Chung Seo
doaj +1 more source
THE IMPACT OF THE INSURANCE MARKET ON THE FINANCIAL SECURITY OF UKRAINE
The need to ensure the state's financial security in the conditions of the growing number of global challenges, risks, dangers and threats as a prerequisite for restoring and preserving the stability of the national economic system was substantiated. The
S. Onyshchenko +3 more
semanticscholar +1 more source
Efficient Implementation of AES and CTR_DRBG on 8-Bit AVR-Based Sensor Nodes
Since Rijndael algorithm was selected as the Advanced Encryption Standard (AES) by NIST, optimization research for the AES has been actively conducted on various IoT-based processors.
Youngbeom Kim, Seog Chung Seo
doaj +1 more source
Financial security as a factor of military security
Considering that ensuring the stability, reliability and efficiency of the financial system is a prerequisite for the country's defence capability, it has been noted that these positions are the basis for the interdependence of military and financial ...
O. Getmanets, D. Korobtsova
semanticscholar +1 more source

