Journal of Cryptology最新文献

筛选
英文 中文
Ascon v1.2: Lightweight Authenticated Encryption and Hashing Ascon v1.2:轻量级身份验证加密和散列
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-06-22 DOI: 10.1007/s00145-021-09398-9
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
{"title":"Ascon v1.2: Lightweight Authenticated Encryption and Hashing","authors":"Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer","doi":"10.1007/s00145-021-09398-9","DOIUrl":"https://doi.org/10.1007/s00145-021-09398-9","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"34 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09398-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41418400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments 论TLS 1.3的严密安全性:理论上适用于实际部署的可靠加密参数
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-06-04 DOI: 10.1007/s00145-021-09388-x
Denis Diemert, Tibor Jager
{"title":"On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments","authors":"Denis Diemert, Tibor Jager","doi":"10.1007/s00145-021-09388-x","DOIUrl":"https://doi.org/10.1007/s00145-021-09388-x","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09388-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44889929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Fine-Grained Cryptography Revisited 细粒度密码学重访
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-05-24 DOI: 10.1007/s00145-021-09390-3
Shohei Egashira, Yuyu Wang, Keisuke Tanaka
{"title":"Fine-Grained Cryptography Revisited","authors":"Shohei Egashira, Yuyu Wang, Keisuke Tanaka","doi":"10.1007/s00145-021-09390-3","DOIUrl":"https://doi.org/10.1007/s00145-021-09390-3","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09390-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48264785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC 安全通信通道建立:TLS 1.3(基于TCP快速开放)与QUIC
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-05-24 DOI: 10.1007/s00145-021-09389-w
Shan Chen, Samuel Jero, Matthew Jagielski, A. Boldyreva, C. Nita-Rotaru
{"title":"Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC","authors":"Shan Chen, Samuel Jero, Matthew Jagielski, A. Boldyreva, C. Nita-Rotaru","doi":"10.1007/s00145-021-09389-w","DOIUrl":"https://doi.org/10.1007/s00145-021-09389-w","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"34 1","pages":"1-41"},"PeriodicalIF":3.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09389-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51965294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Introduction to the Special Issue on TLS 1.3 TLS 1.3特刊简介
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-05-24 DOI: 10.1007/s00145-021-09386-z
C. Boyd
{"title":"Introduction to the Special Issue on TLS 1.3","authors":"C. Boyd","doi":"10.1007/s00145-021-09386-z","DOIUrl":"https://doi.org/10.1007/s00145-021-09386-z","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"34 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09386-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51965245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers 分组密码缓存定时攻击中预取的形式化分析
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-05-20 DOI: 10.1007/s00145-021-09394-z
C. Rebeiro, Debdeep Mukhopadhyay
{"title":"A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers","authors":"C. Rebeiro, Debdeep Mukhopadhyay","doi":"10.1007/s00145-021-09394-z","DOIUrl":"https://doi.org/10.1007/s00145-021-09394-z","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09394-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46653435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Subversion-Resistant SNARKs 关于抗颠覆SNARK
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-04-28 DOI: 10.1007/s00145-021-09379-y
Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac
{"title":"On Subversion-Resistant SNARKs","authors":"Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac","doi":"10.1007/s00145-021-09379-y","DOIUrl":"https://doi.org/10.1007/s00145-021-09379-y","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09379-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44370120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Business Performance Management in Small and Medium-Sized Enterprises in the Slovak Republic: An Integrated Three-Phase-Framework for Implementation 斯洛伐克共和国中小企业的经营绩效管理:一个综合的三阶段实施框架
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-03-31 DOI: 10.7441/JOC.2021.01.03
Rudolf Gruenbichler, J. Klučka, Katarína Havierniková, Stanislava Strelcová
{"title":"Business Performance Management in Small and Medium-Sized Enterprises in the Slovak Republic: An Integrated Three-Phase-Framework for Implementation","authors":"Rudolf Gruenbichler, J. Klučka, Katarína Havierniková, Stanislava Strelcová","doi":"10.7441/JOC.2021.01.03","DOIUrl":"https://doi.org/10.7441/JOC.2021.01.03","url":null,"abstract":"Business performance management (BPM) is an instrument that allows the fulfillment of business objectives and the improvement of competitiveness in small and medium-sized enterprises (SMEs). When BPM is implemented and measured, it can improve the sustainability and competitiveness of the enterprise. Despite its potential benefits, the possibilities of BPM in SMEs are often underestimated due to the lack of resources (mainly personal or financial). The goal of this paper is to introduce a framework for the implementation of BPM in Slovak SMEs based on research on transportation SMEs. To this end, certain steps that support the efficient introduction and use of BPM in these SMEs will be proposed. Our proposal regarding the performance of BPM is based on the findings of previous research studies along with the results of own questionnaire surveys and personal meetings/interviews with owners/managers of transportation SMEs. The results of this research shows that SMEs are generally not familiar with BPM and how the system is used. Essential elements to implement BPM are lacking in SMEs, and although the BPM system might help these firms improve their competitiveness, SMEs remain uniformed about the advantages of BPM. The proposed framework of BPM implementation in this paper can be used to inform SMEs and to assist them in their decisionmaking processes regarding the application of this system.","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"13 1","pages":"42-58"},"PeriodicalIF":3.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44798442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Creating Value for the Consumer Through Marketing Communication Tools 通过营销传播工具为消费者创造价值
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-03-31 DOI: 10.7441/JOC.2021.01.04
Viktorija Kovanovienė, Giedrius Romeika, Wjatscheslav Baumung
{"title":"Creating Value for the Consumer Through Marketing Communication Tools","authors":"Viktorija Kovanovienė, Giedrius Romeika, Wjatscheslav Baumung","doi":"10.7441/JOC.2021.01.04","DOIUrl":"https://doi.org/10.7441/JOC.2021.01.04","url":null,"abstract":"The situation in the markets is changing rapidly and competition in the business sector is increasing rapidly. As a result, corporate marketing decisions are based on creating greater value for the consumer, which creates competitiveness and provides an advantage in competing for future customer loyalty. The purpose of this study is to determine whether there is a link between marketing communication tools and consumer perceived value in pursuit of consumer loyalty. Qualitative (observational research) and quantitative (a questionnaire survey) research methods were used to investigate the problem empirically. The observational research elucidated the value provided to the consumer by the research objects through marketing communication tools, supplementing the key questions for the quantitative study. Correlation and regression analysis were used in the study, with the results showing a statistically significant relationship between marketing communication tools and consumer perceived value in terms of user loyalty. It has also been determined that the greatest and strongest relationship in consumer value creation through marketing communication tools is the appropriate, mutually coordinated and complementary use of a package of marketing communication tools to achieve synergies that create the preconditions for increasing consumer loyalty in a competitive market.","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"13 1","pages":"59-75"},"PeriodicalIF":3.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42151919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Assessing the Intermediary Role of Relationship Ending Capability and Dark Side Between Network Embeddedness and SMEs’ Innovation Performance 网络嵌入度与中小企业创新绩效的关系终结能力和阴暗面中介作用评估
IF 3 3区 计算机科学
Journal of Cryptology Pub Date : 2021-03-31 DOI: 10.7441/JOC.2021.01.09
ongyun Tian, ourage Simon Kofi Dogbe, Bylon Abeeku Bamfo, Wisdom Wise Kwabla Pomegbe, Prasad Siba Borah
{"title":"Assessing the Intermediary Role of Relationship Ending Capability and Dark Side Between Network Embeddedness and SMEs’ Innovation Performance","authors":"ongyun Tian, ourage Simon Kofi Dogbe, Bylon Abeeku Bamfo, Wisdom Wise Kwabla Pomegbe, Prasad Siba Borah","doi":"10.7441/JOC.2021.01.09","DOIUrl":"https://doi.org/10.7441/JOC.2021.01.09","url":null,"abstract":"A key driver of firm competitive advantage is the firm’s ability to develop along with the everchanging business environment and associated market demands by being innovative. Small and medium-sized enterprises (SMEs), however, often lack adequate resources to develop innovation, so they search for external resources to augment the deficiency of their internal resources. Network embeddedness has many advantages for the firm, but it also has a dark side which has a negative effect on the network relationship. In order to take advantage of a network, firms should cultivate the capability to deal with the dark side of inter-firm relationships. Firstly, this study assesses the effect of network embeddedness on the innovation performance of SMEs. Secondly, the authors investigated the moderating role of this dark side in the relationship between network embeddedness and the innovation performance of SMEs. Finally, the role of relationship ending capability in neutralizing the negative effect of dark side we presented. Empirical analysis was based on 388 SMEs. Various validity and reliability checks were conducted before the presentation of the analysis itself, which was conducted using the ordinary least squares approach in SPSS (v.23). The findings showed the dark side negatively moderated the relationship between network embeddedness and the innovation performance of SMEs. This negative effect is, however, reduced by SMEs with a high relationship ending capability by freeing up firm’s limited resources for more fruitful business relationships.","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"13 1","pages":"146-163"},"PeriodicalIF":3.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41633952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信