Results 81 to 90 of about 13,015 (291)
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and ...
Iram Bashir+4 more
doaj +1 more source
Design of Zn‐Binding Peptide(s) from Protein Fragments
We have designed a short zinc‐binding peptide by taking fragments from proteins with known structure. We have measured the binding affinity with isothermal calorimetry and the structure of the peptide using CD and NMR spectroscopies. These results were computationally supported by molecular dynamics and density functional theory calculations.
Ján Michael Kormaník+9 more
wiley +1 more source
Enzymatic hydrolysis of polyethylene terephthalate (PET) is a promising technology for advancing a circular PET economy. Several PET‐degrading α/β hydrolases have been identified, but the full potential of this enzyme family to catalyze PET hydrolysis remains largely unexplored. To address this, sequence similarity networks were employed to investigate
Zhenyu Hu+4 more
wiley +1 more source
This article describes a robust, sustainable, and industrially viable three‐step process to transform rapeseed oil methyl esters (RME) into biofuel with a boiling point curve that fulfills the modern diesel specifications for the use in contemporary diesel engines.
Mykhailo Kondratiuk+3 more
wiley +1 more source
On the Indifferentiability of the Grøstl Hash Function [PDF]
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the security of hash functions. Concretely, it ensures that a hash function has no structural design flaws and thus guarantees security against generic attacks up to the proven bounds. In this work we prove the indifferentiability of Grostl, a second round SHA-
Andreeva, Elena+2 more
openaire +3 more sources
This report describes the potential of vacuum differential mobility spectrometry (DMS) as an additional separation dimension to reduce liquid chromatography (LC‐MS) analysis time while maintaining good quantitative performance. A 1‐min trap/elute LC‐vDMS‐SIM/MS method for quantification of 11 drugs of abuse was developed and applied to the analysis of ...
Maria Fernanda Cifuentes Girard+2 more
wiley +1 more source
Performance analysis of energy efficient improved LEACH protocol in IoT networks
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia+3 more
wiley +1 more source
A Second Preimage Attack on the XOR Hash Combiner
The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1.
Shiwei Chen+3 more
doaj +1 more source
Comparing the speed of the selected hash and encryption algorithms
The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person.
Dawid Górniak, Piotr Kopniak
doaj +1 more source
Hash‐One: a lightweight cryptographic hash function
The increased demand for lightweight applications has triggered the need for appropriate security mechanisms in them. Lightweight cryptographic hash functions are among the major responses toward such a requirement. The authors thus have a handful of such hash functions such as QUARK, PHOTON, SPONGENT and GLUON introduced already.
Chungath Srinivasan+3 more
openaire +2 more sources