1,636 research outputs found

    The GLA’s London Workforce Employment Series

    Get PDF
    This article describes the construction of the workforce employment data used by the Greater London Authority. It reproduces, in citable form and, for scholarly purposes, the report of the same name produced by the author for the Greater London Authority. This article describes the sources of this data and explains where they can be found. Workforce employment data is a vital resource for many cities, underpinning many city planning decisions Other important data about cities , such as estimates of its economic output, often depend on it. To build a reliable picture of London’s economy, it is essential to understand where its estimates of workforce employment come from, what information they provide and how reliable they are. The report explains what the term ‘workforce employment’ actually means, looks at the data sources that are used to obtain it, and discusses some of their limitations. Appendix A, compiled by Peter Urwin of the University of Westminster, contains a study the GLA commissioned from Westminster University which analyses discrepancies between the UK’s two main primary sources of employment data – the Labour Force Survey (LFS) and the Annual Business Inquiry (ABI). Finally, it explains how GLA Economics selects and compiles its workforce employment series. Appendix B, compiled by Experian Business Studies, explains the statistical methods used to construct the data from the primary sources.Keywords: Labour Market; Minimum Wage; Living Wage

    Secure Block Ciphers - Cryptanalysis and Design

    Get PDF

    Differential cryptanalysis of substitution permutation networks and Rijndael-like ciphers

    Get PDF
    A block cipher, in general, consist of several repetitions of a round transformation. A round transformation is a weak block cipher which consists of a nonlinear substitution transformation, a linear diffusion transformation and a key mixing. Differential cryptanalysis is a well known chosen plaintext attack on block ciphers. In this project, differential cryptanalysis is performed on two kinds of block ciphers: Substitution Permutation Networks(SPN) and Rijndael-like Ciphers. In order to strengthen a block cipher against differential attack, care should be taken in the design of both substitution and diffusion components and in the choice of number of rounds. In this context, most of the researches has been focused on the design of substitution component. In this project, differential cryptanalysis is carried out on several SPNs to find the role of permutation. Differential analysis on Rijndael-like ciphers is done to find the strength of the cipher as a whole. Tools are developed to configure and to perform differential analysis on these ciphers. In the context of SPN, the importance of permutation, the effect of bad permutation, no permutation and sequentially chosen plaintext pairs are discussed. The diffusion strength of SPN and Rijndael-like ciphers are discussed and compared

    Whirlwind: a new cryptographic hash function

    Get PDF
    A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided. In comparison to the algorithms submitted to the SHA-3 competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance is not outstanding, it compares favourably with the 512-bit versions of SHA-3 candidates such as LANE or the original CubeHash proposal and is about on par with ECHO and MD6

    Case studies in symmetric key cryptography

    Get PDF

    Agricultural Globalization in Developing Countries: Rules, Rationales and Results

    Get PDF
    This paper aims to provide a descriptive and analytical account of the extent to which agriculture in the developing economies has become integrated with external markets. For most developing economies (DEs), the 1980s were a time of crisis when liberal reforms, including domestic and external liberalization of agriculture, were also initiated. This was followed by the coming into force of the Agreement on Agriculture under WTO aegis. The evidence on trade flows does indicate increased agricultural globalization in developing economies (DEs) following these regime shifts. But increased trade flows have not been accompanied by relative price convergence as between the DEs and the advanced economies (AEs) suggesting both that the policy shifts have been asymmetric and that significant parts of agricultural trade between North and South remain complementary rather than, as is often assumed, competitive. Moreover, the “fallacy of composition”, implicit in any global imposition of trade liberalization and not confined to primary products as such, also seems to have been at work for most of the period. At the same time, the threat of higher consumer prices (especially for the poor and vulnerable in both importing and exporting DEs) looms large. Its impact will be felt as and when production and export subsidies in the AEs are dismantled. Meanwhile, the regime shifts seem to have induced, on the one hand, excessive faith in the efficacy of agricultural prices to produce agricultural supply response and, on the other, reduced fiscal and organizational capacities to provide public agricultural inputs and services. These conclusions are consonant with a structuralist understanding of global trade and production possibilities that DEs confront.
    • 

    corecore