Results 11 to 20 of about 21,521,866 (302)
The current web security algorithms faced some drawbacks which making them under breakdown situations, these algorithms are such as SHA-1 and MD5 which they are already hacked. This work proposes a new digital signature scheme for building a web security
S. F. Lu, Haider Ali, O. Farooq
semanticscholar +3 more sources
Low Power Implementation of Secure Hashing Algorithm (SHA-2) using VHDL on FPGA of SHA-256
Due to the rapid developments in the wireless communications area and personal communications systems, providing information security has become a more and more important subject.
Dipti Thakur
semanticscholar +2 more sources
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]
The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security.
H. Mestiri+3 more
semanticscholar +2 more sources
Visualising Sha[2] in Abelian surfaces [PDF]
Given an elliptic curve E1 over a number field and an element s in its 2-Selmer group, we give two different ways to construct infinitely many Abelian surfaces A such that the homogeneous space representing s occurs as a fibre of A over another elliptic ...
Nils Bruin
openalex +4 more sources
Preimages for Step-Reduced SHA-2 [PDF]
In this paper, we present a preimage attack for 42 step-reduced SHA-256 with time complexity $2^{251.7}$ and memory requirements of order $2^{12}$.
Kazumaro Aoki+4 more
openalex +4 more sources
Peri-implant soft tissue conditioning of immediate posterior implants by CAD-CAM socket sealing abutments: a randomized clinical trial [PDF]
Background Anatomically formed healing abutments were suggested in literature to address many of the issues associated with immediate posterior implant insertion such as large extraction sockets that are extremely hard to seal without reflecting the ...
Mai Mohamed Elgendi+2 more
doaj +2 more sources
Integrated miRNA-seq and functional analyses reveal the regulatory role of sha-miR-92a_L + 2R + 4 via targeting vegfaa in rainbow trout (Oncorhynchus mykiss) responding to acute hypoxia and reoxygenation stress [PDF]
Background Hypoxia negatively affects the behavior, growth, reproduction and survival of fish, causing serious economic losses to aquaculture. Rainbow trout (Oncorhynchus mykiss), an important economic fish worldwide, belongs to a hypoxia-sensitive fish ...
Yongjuan Li+3 more
doaj +2 more sources
Exhibiting SHA[2] on hyperelliptic Jacobians [PDF]
We discuss approaches to computing in the Shafarevich-Tate group of Jacobians of higher genus curves, with an emphasis on the theory and practice of visualisation.
Nils Bruin, E. V. Flynn
openalex +3 more sources
Hardware authentication based on PUFs and SHA-3 2<sup>nd</sup> round candidates [PDF]
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Susana Eiroa, Iluminada Baturone
openalex +4 more sources
As the technologies for peptide synthesis and development continue to mature, antimicrobial peptides (AMPs) are being widely studied as significant contributors in medicinal chemistry research. Furthermore, the advancement in the synthesis of dendrimers’
Arif Iftikhar Khan+9 more
doaj +1 more source