Pub Date : 2021-07-27DOI: 10.1007/s00145-021-09399-8
Ted Krovetz, P. Rogaway
{"title":"The Design and Evolution of OCB","authors":"Ted Krovetz, P. Rogaway","doi":"10.1007/s00145-021-09399-8","DOIUrl":"https://doi.org/10.1007/s00145-021-09399-8","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09399-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49334221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.1007/s00145-021-09400-4
Qipeng Liu, Mark Zhandry
{"title":"Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness","authors":"Qipeng Liu, Mark Zhandry","doi":"10.1007/s00145-021-09400-4","DOIUrl":"https://doi.org/10.1007/s00145-021-09400-4","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09400-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41520950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-22DOI: 10.1007/s00145-021-09398-9
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
{"title":"Ascon v1.2: Lightweight Authenticated Encryption and Hashing","authors":"Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer","doi":"10.1007/s00145-021-09398-9","DOIUrl":"https://doi.org/10.1007/s00145-021-09398-9","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2021-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09398-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41418400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-04DOI: 10.1007/s00145-021-09388-x
Denis Diemert, Tibor Jager
{"title":"On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments","authors":"Denis Diemert, Tibor Jager","doi":"10.1007/s00145-021-09388-x","DOIUrl":"https://doi.org/10.1007/s00145-021-09388-x","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09388-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44889929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-24DOI: 10.1007/s00145-021-09389-w
Shan Chen, Samuel Jero, Matthew Jagielski, A. Boldyreva, C. Nita-Rotaru
{"title":"Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC","authors":"Shan Chen, Samuel Jero, Matthew Jagielski, A. Boldyreva, C. Nita-Rotaru","doi":"10.1007/s00145-021-09389-w","DOIUrl":"https://doi.org/10.1007/s00145-021-09389-w","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09389-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51965294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-24DOI: 10.1007/s00145-021-09386-z
C. Boyd
{"title":"Introduction to the Special Issue on TLS 1.3","authors":"C. Boyd","doi":"10.1007/s00145-021-09386-z","DOIUrl":"https://doi.org/10.1007/s00145-021-09386-z","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09386-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51965245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-20DOI: 10.1007/s00145-021-09394-z
C. Rebeiro, Debdeep Mukhopadhyay
{"title":"A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers","authors":"C. Rebeiro, Debdeep Mukhopadhyay","doi":"10.1007/s00145-021-09394-z","DOIUrl":"https://doi.org/10.1007/s00145-021-09394-z","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s00145-021-09394-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46653435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rudolf Gruenbichler, J. Klučka, Katarína Havierniková, Stanislava Strelcová
Business performance management (BPM) is an instrument that allows the fulfillment of business objectives and the improvement of competitiveness in small and medium-sized enterprises (SMEs). When BPM is implemented and measured, it can improve the sustainability and competitiveness of the enterprise. Despite its potential benefits, the possibilities of BPM in SMEs are often underestimated due to the lack of resources (mainly personal or financial). The goal of this paper is to introduce a framework for the implementation of BPM in Slovak SMEs based on research on transportation SMEs. To this end, certain steps that support the efficient introduction and use of BPM in these SMEs will be proposed. Our proposal regarding the performance of BPM is based on the findings of previous research studies along with the results of own questionnaire surveys and personal meetings/interviews with owners/managers of transportation SMEs. The results of this research shows that SMEs are generally not familiar with BPM and how the system is used. Essential elements to implement BPM are lacking in SMEs, and although the BPM system might help these firms improve their competitiveness, SMEs remain uniformed about the advantages of BPM. The proposed framework of BPM implementation in this paper can be used to inform SMEs and to assist them in their decisionmaking processes regarding the application of this system.
{"title":"Business Performance Management in Small and Medium-Sized Enterprises in the Slovak Republic: An Integrated Three-Phase-Framework for Implementation","authors":"Rudolf Gruenbichler, J. Klučka, Katarína Havierniková, Stanislava Strelcová","doi":"10.7441/JOC.2021.01.03","DOIUrl":"https://doi.org/10.7441/JOC.2021.01.03","url":null,"abstract":"Business performance management (BPM) is an instrument that allows the fulfillment of business objectives and the improvement of competitiveness in small and medium-sized enterprises (SMEs). When BPM is implemented and measured, it can improve the sustainability and competitiveness of the enterprise. Despite its potential benefits, the possibilities of BPM in SMEs are often underestimated due to the lack of resources (mainly personal or financial). The goal of this paper is to introduce a framework for the implementation of BPM in Slovak SMEs based on research on transportation SMEs. To this end, certain steps that support the efficient introduction and use of BPM in these SMEs will be proposed. Our proposal regarding the performance of BPM is based on the findings of previous research studies along with the results of own questionnaire surveys and personal meetings/interviews with owners/managers of transportation SMEs. The results of this research shows that SMEs are generally not familiar with BPM and how the system is used. Essential elements to implement BPM are lacking in SMEs, and although the BPM system might help these firms improve their competitiveness, SMEs remain uniformed about the advantages of BPM. The proposed framework of BPM implementation in this paper can be used to inform SMEs and to assist them in their decisionmaking processes regarding the application of this system.","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44798442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}