Results 1 to 10 of about 32,333 (139)

A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator [PDF]

open access: yesIEEE Access, 2022
The secure hash algorithm 2 (SHA-2) family, including the SHA-224/256/384/512 hash functions, is widely adopted in many modern domains, ranging from Internet of Things devices to cryptocurrency.
Hoai Luan Pham   +3 more
doaj   +2 more sources

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions [PDF]

open access: yesSensors, 2022
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi   +5 more
doaj   +2 more sources

Faster bowel recovery with superior haemorrhoidal artery preservation in patients undergoing sigmoidectomy for diverticular disease: A retrospective cohort study from the diverticular disease registry trial [PDF]

open access: yesJournal of Minimal Access Surgery
Introduction: The pathogenesis of diverticular disease varies significantly and so does its clinical presentation. The procedure for left-sided diverticular disease is standardised, but there is still no consensus on the level of arterial ligation.
Jacopo Crippa   +16 more
doaj   +2 more sources

Evaluating the efficacy of eggshell-derived hydroxyapatite (EHA) and synthetic hydroxyapatite (SHA) in bone regeneration of maxillofacial defects-a randomized double-blind pilot comparative clinical-radiological study [PDF]

open access: yesJournal of Oral Biology and Craniofacial Research
Background: Defects of the maxillofacial skeleton lead to functional, aesthetic, social, and behavioral problems, that make the person isolate from the mainstream of society. So, bone regeneration is needed for the overall health. Since long time various
Khushboo Changani   +6 more
doaj   +2 more sources

SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey [PDF]

open access: yesIEEE Access, 2020
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements ...
Raffaele Martino, Alessandro Cilardo
doaj   +5 more sources

A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs [PDF]

open access: yesIEEE Access, 2019
Hash functions are a crucial tool in a large variety of applications, ranging from security protocols to cryptocurrencies down to the Internet-of-Things devices used, for example, as biomedical appliances.
Raffaele Martino, Alessandro Cilardo
doaj   +4 more sources

Multi-mode operator for SHA-2 hash functions [PDF]

open access: yesJournal of Systems Architecture, 2007
We propose an improved implementation of the SHA-2 hash family, with minimal operator latency and reduced hardware requirements. We also propose a high frequency version at the cost of only two cycles of latency per message. Finally we present a multi-mode architecture able to perform either a SHA-384 or SHA-512 hash or to behave as two independent SHA-
Glabb, Ryan   +4 more
openaire   +4 more sources

Design, Synthesis and Characterization of [G10a]-Temporin SHa Dendrimers as Dual Inhibitors of Cancer and Pathogenic Microbes

open access: yesBiomolecules, 2022
As the technologies for peptide synthesis and development continue to mature, antimicrobial peptides (AMPs) are being widely studied as significant contributors in medicinal chemistry research. Furthermore, the advancement in the synthesis of dendrimers’
Arif Iftikhar Khan   +9 more
doaj   +1 more source

Applying Grover's Algorithm to Hash Functions: A Software Perspective

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj   +1 more source

Enhanced immunogenicity of stabilized trimeric soluble influenza hemagglutinin. [PDF]

open access: yesPLoS ONE, 2010
The recent swine-origin H1N1 pandemic illustrates the need to develop improved procedures for rapid production of influenza vaccines. One alternative to the current egg-based manufacture of influenza vaccine is to produce a hemagglutinin (HA) subunit ...
William C Weldon   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy