Results 21 to 30 of about 352,688 (269)
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms.
Yongseong Lee +3 more
doaj +1 more source
Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the ...
Na Young Ahn +3 more
doaj +1 more source
Classification of 4-bit S-Boxes for BOGI Permutation
Bad Output must go to Good Input (BOGI) is the primary design strategy of GIFT, a lightweight block cipher that was presented at CHES 2017. Because this strategy obviates the need to adhere to the required conditions of S-boxes when adopting bit ...
Seonggyeom Kim +3 more
doaj +1 more source
Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al.
Seog Chung Seo, Donggeun Kwon
doaj +1 more source
Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial ...
Marc Jofre +6 more
doaj +1 more source
Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking method to cryptosystems consisting of Boolean and arithmetic operations, such as ARX (Addition, Rotation, XOR) block ciphers, a masking conversion ...
HanBit Kim, Seokhie Hong, HeeSeok Kim
doaj +1 more source
Gamification vs. Privacy: Identifying and Analysing the Major Concerns
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains.
Aikaterini-Georgia Mavroeidi +3 more
doaj +1 more source
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan +3 more
doaj +1 more source
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga +56 more
wiley +1 more source
Citizens’ Information Privacy Protection Model in e-Government for Developing Countries [PDF]
The most important aim of this study is to propose a model for protecting citizens’ information privacy in e-Government for developing countries. This study develops theoretical foundations and models of e-Government in judicial-legal dimension.
Mohammad Taghi Taghavifard +3 more
doaj +1 more source

