SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj +2 more sources
Temporins are anti-microbial peptides synthesized in the skin of frogs of the Ranidae family. The few studies to date that have examined their anti-viral properties have shown that they have potential as anti-viral therapies.
Maëva Roy +8 more
doaj +3 more sources
Evaluating the efficacy of eggshell-derived hydroxyapatite (EHA) and synthetic hydroxyapatite (SHA) in bone regeneration of maxillofacial defects-a randomized double-blind pilot comparative clinical-radiological study [PDF]
Background: Defects of the maxillofacial skeleton lead to functional, aesthetic, social, and behavioral problems, that make the person isolate from the mainstream of society. So, bone regeneration is needed for the overall health. Since long time various
Khushboo Changani +6 more
doaj +2 more sources
Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop [PDF]
Dampak positif kemajuan teknologi informasi dapat membantu menyelesaikan pekerjan dan pertukaran data dan informasi dengan cepat, akurat, dan efisien.
Ratno Prasetyo, Asep Suryana
doaj +4 more sources
Faster bowel recovery with superior haemorrhoidal artery preservation in patients undergoing sigmoidectomy for diverticular disease: A retrospective cohort study from the diverticular disease registry trial [PDF]
Introduction: The pathogenesis of diverticular disease varies significantly and so does its clinical presentation. The procedure for left-sided diverticular disease is standardised, but there is still no consensus on the level of arterial ligation.
Jacopo Crippa +16 more
doaj +2 more sources
A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map [PDF]
INTRODUCTION: In order to protect the owner’s visual multimedia data, various watermarking methods have introducedin the last few years. In image watermarking techniques, a secret watermark image inserted into another image.OBJECTIVES: The main aim of ...
Shahzad Alam, Tanvir Ahmad, M. Doja
doaj +1 more source
Based on interdigitated capacitance structure (ICS), a method for realizing low-loss tunable metasurfaces (TMS) is proposed in the paper. The variation in the metal patch structure and the PIN diode position indicates that introducing additional ...
Jianghao Tian +5 more
doaj +1 more source
Authenticated and Secure End-To-End Communication Channel Using SMS Messages [PDF]
One of the key issues of modern cryptography is the problem of establishing a secure end-to-end communication over an insecure communication channel. Short Message Service (SMS) is a hugely popular and easily adopted communications technology for mobile ...
Abdullah Abdullah
doaj +1 more source
Applying Grover's Algorithm to Hash Functions: A Software Perspective
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj +1 more source
Fast Implementation of SHA-3 in GPU Environment
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj +1 more source

