Results 41 to 50 of about 46,179 (288)
This study aims to analyze the minimum needs of Zakat al-Fitr distributed to Mustahiq so they do not beg on Eid al-Fitr and can pay Zakat al-fitr. Being Muslims, fuqaraa and masakeen as priority recipients of Zakat al-Fitr are also obliged to pay Zakat ...
Muhammad Nurul Alim
doaj +1 more source
Implementation of high-speed SHA-1 architecture
This paper proposes a new SHA-1 architecture to exploit higher parallelism and to shorten the critical path for Hash operations. It enhances a performance without significant area penalty. We implemented the proposed SHA-1 architecture on FPGA that showed the maximum clock frequency of 118MHz allows a data throughput rate of 5.9Gbps.
Eun-Hee Lee +3 more
openaire +2 more sources
Deploying a New Hash Algorithm [PDF]
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away from those now, it is clear that it will be necessary to do so in the not-too ...
Bellovin, Steven Michael +1 more
core +4 more sources
PASTA‐ELN: Simplifying Research Data Management for Experimental Materials Science
Research data management faces ongoing hurdles as many ELNs remain complex and restrictive. PASTA‐ELN offers an open‐source, cross‐platform solution that prioritizes simplicity, offline access, and user control. Its in tuitive folder structure, modular Python add‐ons, and open formats enable seamless documentation, FAIR data practices, and easy ...
S. Brinckmann, G. Winkens, R. Schwaiger
wiley +1 more source
Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh +2 more
doaj +1 more source
xxxx. ABSTRACT Glioblastoma (GBM) remains one of the most lethal brain cancers, with median survival rarely exceeding 15 months after diagnosis. Interleukin‐12 (IL‐12) is a potent immunostimulatory cytokine capable of reshaping the tumor microenvironment (TME), yet its clinical translation is hindered by systemic toxicity and short half‐life. RNA‐based
Fatima Hameedat +11 more
wiley +1 more source
Digital Signature dengan Algoritma Sha-1 dan Rsa sebagai Autentikasi [PDF]
Untuk meningkatkan daya saing tenaga kerja Indonesia dengan tenaga kerja asing, pada era MEA saat ini diberlakukan Surat Keterangan Pendamping Ijazah (SKPI) di seluruh Institusi Perguruan Tinggi di Indonesia.
Atika, P. D. (Prima) +1 more
core
FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo +2 more
core +1 more source
Flexoelectrically Induced Polar Topology in Twisted SrTiO3 Membranes
Twisted SrTiO3 bilayers host polar vortices of flexoelectric origin, revealed through combined experiment and theory. By reconstructing polarization from the toroidal moment of strain gradients, the work establishes a 3D chiral state with broken inversion and mirror symmetries.
Isabel Tenreiro +13 more
wiley +1 more source
Finding SHA-1 Characteristics: General Results and Applications [PDF]
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way.
Christophe De Cannière +1 more
openaire +1 more source

