Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
{"title":"Ascon v1.2: Lightweight Authenticated Encryption and Hashing","authors":"Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer","doi":"10.1007/s00145-021-09398-9","DOIUrl":"https://doi.org/10.1007/s00145-021-09398-9","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"34 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09398-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41418400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments","authors":"Denis Diemert, Tibor Jager","doi":"10.1007/s00145-021-09388-x","DOIUrl":"https://doi.org/10.1007/s00145-021-09388-x","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09388-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44889929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shan Chen, Samuel Jero, Matthew Jagielski, A. Boldyreva, C. Nita-Rotaru
{"title":"Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC","authors":"Shan Chen, Samuel Jero, Matthew Jagielski, A. Boldyreva, C. Nita-Rotaru","doi":"10.1007/s00145-021-09389-w","DOIUrl":"https://doi.org/10.1007/s00145-021-09389-w","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"34 1","pages":"1-41"},"PeriodicalIF":3.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09389-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51965294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to the Special Issue on TLS 1.3","authors":"C. Boyd","doi":"10.1007/s00145-021-09386-z","DOIUrl":"https://doi.org/10.1007/s00145-021-09386-z","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"34 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09386-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51965245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers","authors":"C. Rebeiro, Debdeep Mukhopadhyay","doi":"10.1007/s00145-021-09394-z","DOIUrl":"https://doi.org/10.1007/s00145-021-09394-z","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09394-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46653435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rudolf Gruenbichler, J. Klučka, Katarína Havierniková, Stanislava Strelcová
{"title":"Business Performance Management in Small and Medium-Sized Enterprises in the Slovak Republic: An Integrated Three-Phase-Framework for Implementation","authors":"Rudolf Gruenbichler, J. Klučka, Katarína Havierniková, Stanislava Strelcová","doi":"10.7441/JOC.2021.01.03","DOIUrl":"https://doi.org/10.7441/JOC.2021.01.03","url":null,"abstract":"Business performance management (BPM) is an instrument that allows the fulfillment of business objectives and the improvement of competitiveness in small and medium-sized enterprises (SMEs). When BPM is implemented and measured, it can improve the sustainability and competitiveness of the enterprise. Despite its potential benefits, the possibilities of BPM in SMEs are often underestimated due to the lack of resources (mainly personal or financial). The goal of this paper is to introduce a framework for the implementation of BPM in Slovak SMEs based on research on transportation SMEs. To this end, certain steps that support the efficient introduction and use of BPM in these SMEs will be proposed. Our proposal regarding the performance of BPM is based on the findings of previous research studies along with the results of own questionnaire surveys and personal meetings/interviews with owners/managers of transportation SMEs. The results of this research shows that SMEs are generally not familiar with BPM and how the system is used. Essential elements to implement BPM are lacking in SMEs, and although the BPM system might help these firms improve their competitiveness, SMEs remain uniformed about the advantages of BPM. The proposed framework of BPM implementation in this paper can be used to inform SMEs and to assist them in their decisionmaking processes regarding the application of this system.","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"13 1","pages":"42-58"},"PeriodicalIF":3.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44798442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating Value for the Consumer Through Marketing Communication Tools","authors":"Viktorija Kovanovienė, Giedrius Romeika, Wjatscheslav Baumung","doi":"10.7441/JOC.2021.01.04","DOIUrl":"https://doi.org/10.7441/JOC.2021.01.04","url":null,"abstract":"The situation in the markets is changing rapidly and competition in the business sector is increasing rapidly. As a result, corporate marketing decisions are based on creating greater value for the consumer, which creates competitiveness and provides an advantage in competing for future customer loyalty. The purpose of this study is to determine whether there is a link between marketing communication tools and consumer perceived value in pursuit of consumer loyalty. Qualitative (observational research) and quantitative (a questionnaire survey) research methods were used to investigate the problem empirically. The observational research elucidated the value provided to the consumer by the research objects through marketing communication tools, supplementing the key questions for the quantitative study. Correlation and regression analysis were used in the study, with the results showing a statistically significant relationship between marketing communication tools and consumer perceived value in terms of user loyalty. It has also been determined that the greatest and strongest relationship in consumer value creation through marketing communication tools is the appropriate, mutually coordinated and complementary use of a package of marketing communication tools to achieve synergies that create the preconditions for increasing consumer loyalty in a competitive market.","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"13 1","pages":"59-75"},"PeriodicalIF":3.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42151919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the Intermediary Role of Relationship Ending Capability and Dark Side Between Network Embeddedness and SMEs’ Innovation Performance","authors":"ongyun Tian, ourage Simon Kofi Dogbe, Bylon Abeeku Bamfo, Wisdom Wise Kwabla Pomegbe, Prasad Siba Borah","doi":"10.7441/JOC.2021.01.09","DOIUrl":"https://doi.org/10.7441/JOC.2021.01.09","url":null,"abstract":"A key driver of firm competitive advantage is the firm’s ability to develop along with the everchanging business environment and associated market demands by being innovative. Small and medium-sized enterprises (SMEs), however, often lack adequate resources to develop innovation, so they search for external resources to augment the deficiency of their internal resources. Network embeddedness has many advantages for the firm, but it also has a dark side which has a negative effect on the network relationship. In order to take advantage of a network, firms should cultivate the capability to deal with the dark side of inter-firm relationships. Firstly, this study assesses the effect of network embeddedness on the innovation performance of SMEs. Secondly, the authors investigated the moderating role of this dark side in the relationship between network embeddedness and the innovation performance of SMEs. Finally, the role of relationship ending capability in neutralizing the negative effect of dark side we presented. Empirical analysis was based on 388 SMEs. Various validity and reliability checks were conducted before the presentation of the analysis itself, which was conducted using the ordinary least squares approach in SPSS (v.23). The findings showed the dark side negatively moderated the relationship between network embeddedness and the innovation performance of SMEs. This negative effect is, however, reduced by SMEs with a high relationship ending capability by freeing up firm’s limited resources for more fruitful business relationships.","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"13 1","pages":"146-163"},"PeriodicalIF":3.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41633952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}