Results 1 to 10 of about 46,179 (288)
Algebraic Cryptanalysis of 58-Round SHA-1 [PDF]
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article is to sophisticate and improve Wang’s attack by using algebraic techniques. We introduce new notions, namely semi-neutral bit and adjuster and propose then an improved message modification technique based on algebraic techniques.
Sugita, Makoto +3 more
openaire +1 more source
Effects of Stephania hainanensis alkaloids on MSU-induced acute gouty arthritis in mice
Background Gout is initiated by the precipitation of monosodium urate (MSU) crystals within the joints and soft tissues, and it can eventually cause acute or chronic arthritis.
Hao-fei Fan +8 more
doaj +1 more source
Finding Collisions against 4-Round SHA-3-384 in Practical Time
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang +3 more
doaj +1 more source
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2 [PDF]
PBKDF2 [1] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated pseudorandom function (in our case HMAC-SHA-1). If we are able to speed up a SHA-1 or an HMAC implementation, we are able to speed up PBKDF2-HMAC-SHA-1.
Andrea Visconti, Federico Gorla
openaire +2 more sources
Malicious Hashing: Eve’s Variant of SHA-1 [PDF]
We present collisions for a version of SHA-1 with modified constants, where the colliding payloads are valid binary files. Examples are given of colliding executables, archives, and images. Our malicious SHA-1 instances have round constants that differ from the original ones in only 40 bits (on average). Modified versions of cryptographic standards are
Ange Albertini +4 more
openaire +1 more source
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka +14 more
doaj +1 more source
Action mechanism of coarse particle sulfate soil subgrade modified by volcanic ash
For the gravelly sand type sulfate soil with sodium sulfate content of 2%, the compaction tests, salt expansion tests, collapsibility tests and unconfined compressive strength tests with different ratios of lime, lime + volcanic ash are carried out ...
ZHANG Sha-sha 1, XIE Shan-jie 2, 1, YANG Xiao-hua 1, CHEN Wei-zhi 3
doaj +1 more source
As the most powerful tool for tight gas prediction and exploration in the second member of the Shaximiao Formation (Sha 2 Member) in the Sichuan Basin, the technique of bright spot fails to deliver satisfactory results in the Sha 1 Member. To address the
Ming Zhang +4 more
doaj +1 more source
Second-Preimage Analysis of Reduced SHA-1 [PDF]
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-1 continues to be recommended in all applications except digital signatures after 2010.
openaire +2 more sources
Finding Collisions in the Full SHA-1 [PDF]
In this paper, we present new collision search attacks on the hash function SHA-1. We show that collisions of SHA-1 can be found with complexity less than 269 hash operations. This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound.
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
openaire +1 more source

