Results 91 to 100 of about 13,015 (291)
Waxy‐ or putty‐like materials has emerged as a novel drug preparation for synthetic cannabinoids and other drugs in UK prisons. An in vitro CB1 bioassay was used to evaluate the CB1 activating potential of MDMB‐INACA and extracts from eight seized samples. MDMB‐INACA had moderate efficacy but low potency at CB1.
Axelle Timmerman+9 more
wiley +1 more source
Semi‐Paired Semi‐Supervised Deep Hashing for cross‐view retrieval
In this study, a Semi‐Paired Semi‐Supervised Deep Hashing (SPSDH) is proposed. SPSDH is a novel end‐to‐end deep neural network model with high‐order affinity. A non‐local higher‐order affinity measure that better considers the multimodal neighbourhood structure. And a common representation to associate different modalities is introduced, which combined
Yi Wang+3 more
wiley +1 more source
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie+5 more
doaj
Scenarios of drug exposure and administration as well as detection assays for drugs and methods of sports doping published between 2023 and 2024 are critically reviewed and evaluated in context with the Prohibited List 2024 as established by the World Anti‐Doping Agency.
Mario Thevis+2 more
wiley +1 more source
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions.
Moody Dustin+2 more
doaj +1 more source
Online Supervised Sketching Hashing for Large-Scale Image Retrieval
Online hashing methods have achieved a good tradeoff between the accuracy and the efficiency for learning the hash functions in the online settings. Compared to the stochastic gradient descent-based online hashing methods, the data sketching-based online
Zhenyu Weng, Yuesheng Zhu
doaj +1 more source
Cryptanalysis of the GOST Hash Function [PDF]
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a 256-bit hash value. As opposed to most commonly used hash functions such as MD5 and SHA-1, the GOST hash function defines, in addition to the common iterative structure, a ...
Kontak, Marcin+4 more
openaire +3 more sources
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions. [PDF]
Eledlebi K+5 more
europepmc +1 more source
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
Abstract In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms. In 2019, the full‐round (24 rounds) GIMLI permutation was used as an underlying primitive for building AEAD GIMLI‐CIPHER and hash function GIMLI ...
Yongseong Lee+3 more
wiley +1 more source
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications.
Abdullah Sevin+1 more
doaj +1 more source