Results 41 to 50 of about 3,894,133 (310)
Improved Correlation Power Analysis on Bitslice Block Ciphers
Bitslice block ciphers have the advantage of allowing parallel computation using bitwise logical operations, and Boolean masking can be applied efficiently.
Jaeseung Han +4 more
doaj +1 more source
The spread of digital information technologies can significantly increase the opportunities for publicity and growth of financial relations, reduce abuse and corruption, which in turn will contribute to financial security at all levels of the economic ...
L. Hrytsenko +4 more
semanticscholar +1 more source
Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling
In this paper, we propose single-trace side-channel attacks against $\mathsf {CRYSTALS{-}DILITHIUM}$ . $\mathsf {CRYSTALS{-}DILITHIUM}$ is a lattice-based digital signature algorithm, one of the third round finalists of the national institute of ...
Jaeseung Han +7 more
doaj +1 more source
FINANCIAL SECURITY OF THE STATE
Financial security of the state / Oleg Reznik, Olga Getmanets, Andrii Kovalchuk and ot. // Journal of Security and Sustainability Issues. – 2020. – Vol. 9, № 3. – P. 843-852. – DOI: https://doi.org/10.9770/jssi.2020.9.3(10). Reznik, O., Olga Getmanets, O., Kovalchuk, A., Nastyuk, V., Andriichenko, N. 2020. Financial security of the state.
Rieznik, Oleh Mykolaiovych +4 more
openaire +2 more sources
The results reported in this paper proved the need to develop strategic measures of the financial security management of enterprises. Approaches to understanding the essence of "management" and "financial security of an enterprise" concepts were analyzed;
Pavlo Pronoza, T. Kuzenko, N. Sablina
semanticscholar +1 more source
AVX512Crypto: Parallel Implementations of Korean Block Ciphers Using AVX-512
Cryptographic algorithms are widely used as the foundation of various security systems and applications (e.g., secure communication, blockchain systems, and cloud services).
Yongryeol Choi +2 more
doaj +1 more source
Purpose. The aim of the study is to characterize the features of financial fraud in enterprises and in people’s lives, to identify identification criteria and substantiate practical recommendations for ways to minimize it in modern conditions. Methodology of research.
Liubov Honchar +2 more
openaire +2 more sources
The study looked at how government policies and financial security affect the use of mobile money services. A mixed method was used, with a focus group and survey questionnaires administered. Data was collected from 2041 mobile money users were collected
Afful Ekow Kelly, S. Palaniappan
semanticscholar +1 more source
FINANCIAL SECURITY IN SMALL BUSINESS IN PERIOD OF DIGITAL ECONOMY: IN CASE OF UZBEKISTAN
In this paper has been proposed a methodology for ensuring the financial security of enterprises in the context of recession caused by the COVID-19 pandemic.
B. Tursunov
semanticscholar +1 more source
Impact factors and structural analysis of the state's financial security
The concept of state financial security is a key one, due to the fact that it reflects the state of the country, its public finances, as well as the state of the financial sector operating within it.
R. Dankiewicz +3 more
semanticscholar +1 more source

