Results 21 to 30 of about 352,688 (269)

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, 2023
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms.
Yongseong Lee   +3 more
doaj   +1 more source

Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea

open access: yesIEEE Access, 2020
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the ...
Na Young Ahn   +3 more
doaj   +1 more source

Classification of 4-bit S-Boxes for BOGI Permutation

open access: yesIEEE Access, 2020
Bad Output must go to Good Input (BOGI) is the primary design strategy of GIFT, a lightweight block cipher that was presented at CHES 2017. Because this strategy obviates the need to adhere to the required conditions of S-boxes when adopting bit ...
Seonggyeom Kim   +3 more
doaj   +1 more source

Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers

open access: yesApplied Sciences, 2020
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al.
Seog Chung Seo, Donggeun Kwon
doaj   +1 more source

Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach

open access: yesApplied Sciences, 2021
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial ...
Marc Jofre   +6 more
doaj   +1 more source

Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor

open access: yesApplied Sciences, 2019
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking method to cryptosystems consisting of Boolean and arithmetic operations, such as ARX (Addition, Rotation, XOR) block ciphers, a masking conversion ...
HanBit Kim, Seokhie Hong, HeeSeok Kim
doaj   +1 more source

Gamification vs. Privacy: Identifying and Analysing the Major Concerns

open access: yesFuture Internet, 2019
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains.
Aikaterini-Georgia Mavroeidi   +3 more
doaj   +1 more source

A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan   +3 more
doaj   +1 more source

Survival for Children Diagnosed With Wilms Tumour (2012–2022) Registered in the UK and Ireland Improving Population Outcomes for Renal Tumours of Childhood (IMPORT) Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga   +56 more
wiley   +1 more source

Citizens’ Information Privacy Protection Model in e-Government for Developing Countries [PDF]

open access: yesپژوهش‌های مدیریت عمومی, 2016
The most important aim of this study is to propose a model for protecting citizens’ information privacy in e-Government for developing countries. This study develops theoretical foundations and models of e-Government in  judicial-legal dimension.
Mohammad Taghi Taghavifard   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy