Results 141 to 150 of about 32,391 (267)
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 [PDF]
Li Ji, Takanori Isobe, Kyoji Shibutani
openalex +1 more source
ABSTRACT To cultivate the capability of making informed decisions on socioscientific issues, ideally, we hope students would engage in discerning and evaluating justifications for and against different positions while constructing well‐structured, persuasive arguments.
Xiaowei Tang+4 more
wiley +1 more source
ABSTRACT This study employs an innovative instrumental variable (IV) quantile regression approach to analyze the impact of oil price fluctuations and healthcare costs on economic growth across various income levels in OECD countries from 1970 to 2022. The analysis demonstrates that oil prices and healthcare expenditures significantly affect growth in ...
Hammed Oluwaseyi Musibau
wiley +1 more source
This review explores the potential of antimicrobial peptides (AMPs) and nanotechnology for the treatment of gastrointestinal infections. It analyzes bacterial resistance mechanisms, the antimicrobial actions of AMPs, and advances in nanocarriers, such as lipid‐based, polymeric, metallic, and mesoporous silica systems, that enhance peptide protection ...
Christian Shleider Carnero Canales+10 more
wiley +1 more source
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
Sonia Belaïd+4 more
openalex +1 more source
Implementation of Security Access Service using SHA-2 Algorithm
Shubhashree Holla, S. Akhila
openalex +1 more source
TiO2 is highly relevant in photoelectrochemistry, (photo)catalysis, and sensor applications, where high conductivity is crucial. Herein, a co‐doping strategy for TiO2 using Nb(V) and Sn(IV) is developed, enhancing electron extraction from perovskite and improving solar cell efficiency and stability.
Thomas W. Gries+29 more
wiley +1 more source