Results 21 to 30 of about 367,444 (216)

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, 2023
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms.
Yongseong Lee   +3 more
doaj   +1 more source

Classification of 4-bit S-Boxes for BOGI Permutation

open access: yesIEEE Access, 2020
Bad Output must go to Good Input (BOGI) is the primary design strategy of GIFT, a lightweight block cipher that was presented at CHES 2017. Because this strategy obviates the need to adhere to the required conditions of S-boxes when adopting bit ...
Seonggyeom Kim   +3 more
doaj   +1 more source

Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach

open access: yesApplied Sciences, 2021
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial ...
Marc Jofre   +6 more
doaj   +1 more source

Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers

open access: yesApplied Sciences, 2020
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al.
Seog Chung Seo, Donggeun Kwon
doaj   +1 more source

Information Privacy Assimilation

open access: yesInternational Journal of Digital Strategy, Governance, and Business Transformation, 2022
This paper proposes a framework to understand organizations' perspectives while safeguarding customers' information privacy. Following a detailed literature review, a broad conceptual model was developed to build a theory based on a multi-site, multi-case study approach.
Suhasish Halder   +2 more
openaire   +1 more source

Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor

open access: yesApplied Sciences, 2019
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking method to cryptosystems consisting of Boolean and arithmetic operations, such as ARX (Addition, Rotation, XOR) block ciphers, a masking conversion ...
HanBit Kim, Seokhie Hong, HeeSeok Kim
doaj   +1 more source

Gamification vs. Privacy: Identifying and Analysing the Major Concerns

open access: yesFuture Internet, 2019
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains.
Aikaterini-Georgia Mavroeidi   +3 more
doaj   +1 more source

Citizens’ Information Privacy Protection Model in e-Government for Developing Countries [PDF]

open access: yesپژوهش‌های مدیریت عمومی, 2016
The most important aim of this study is to propose a model for protecting citizens’ information privacy in e-Government for developing countries. This study develops theoretical foundations and models of e-Government in  judicial-legal dimension.
Mohammad Taghi Taghavifard   +3 more
doaj   +1 more source

Protecting farmers' data privacy and confidentiality: Recommendations and considerations

open access: yesFrontiers in Sustainable Food Systems, 2022
With the increasing use of precision agriculture and technological development, the agricultural sector has been majorly transformed. Precision agriculture uses technological innovations such as sensors, drones, and data analysis tools to improve the ...
Jasmin Kaur   +4 more
doaj   +1 more source

An enhanced DPoS consensus mechanism using quadratic voting in Web 3.0 ecosystem [PDF]

open access: yesBlockchain
Consensus mechanisms are fundamental to maintaining consistency in distributed systems. With the advent of Web 3.0, blockchain has revealed limitations of traditional Delegated Proof of Stake (DPoS) consensus mechanisms.
Tianyu Lei   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy