Results 21 to 30 of about 3,894,133 (310)
Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment
Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys to a password in various occasions. For example, it is used for file encryption and implementation of authentication systems, and so
Hojin Choi, Seog Chung Seo
doaj +1 more source
Introduction. Today’s conditions once again prove that the activities of enterprises are influenced not only by economic factors, but also by political, social, demographic, medical, and informational factors.
N. Zhuk
semanticscholar +1 more source
ANALYSIS OF RISKS IN THE FINANCIAL SECURITY MANAGEMENT SYSTEM OF BUSINESS ENTITIES
Financial and economic activity is exposed to numerous systemic risks, which are a threat to the financial security of enterprises. The criterion for ensuring financial security is the appropriate level of the company's financial condition. The financial
Zenovii-Mykhailo Zadorozhnyy +5 more
semanticscholar +1 more source
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing ...
Yeongjae Park +5 more
doaj +1 more source
THE MONETARY COMPONENT IN ENSURING THE FINANCIAL SECURITY OF THE STATE
The paper studies the place and degree of the monetary component's influence on the level of financial security of the state in the conditions of political and socio-economic imbalances in the development of Ukraine.
V. Kovalenko +4 more
semanticscholar +1 more source
Fast Implementation of SHA-3 in GPU Environment
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj +1 more source
Monitoring System for Regional Financial Security
A monitoring system for regional financial security based on a key set of indicators can be used to timely and promptly identify, analyse and assess security threats at the meso-level.
E. V. Karanina, M. Kyzyurov
semanticscholar +1 more source
Recoverable Random Numbers in an Internet of Things Operating System
Over the past decade, several security issues with Linux Random Number Generator (LRNG) on PCs and Androids have emerged. The main problem involves the process of entropy harvesting, particularly at boot time.
Taeill Yoo, Ju-Sung Kang, Yongjin Yeom
doaj +1 more source
Optimized Implementation of PIPO Block Cipher on 32-Bit ARM and RISC-V Processors
A lightweight block cipher PIPO-64/128 was presented in ICISC’2020. PIPO of the 8-bit unit using an unbalanced-bridge S-box showed better performance than other lightweight block cipher algorithms on an 8-bit AVR environment.
Youngbeom Kim, Seog Chung Seo
doaj +1 more source
NATIONAL ENERGY SECURITY: FINANCIAL DETERMINANTS
The snowballing economic growth has reached the level where the energy industry has a crucial impact on the future pace of development. National energy security influences the adequate performance of all economic spheres and stable government processes.
Tetyana Pimonenko +3 more
openaire +3 more sources

