Results 11 to 20 of about 22,218,864 (289)

Performance analysis of SHA 2 and SHA 3

open access: greenSocial Science Research Network, 2022
Swati Sharma, Loveneet, Saba Khanum
openalex   +2 more sources

Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]

open access: bronze, 2014
Hassen Mestiri   +3 more
openalex   +2 more sources

Design, Synthesis and Characterization of [G10a]-Temporin SHa Dendrimers as Dual Inhibitors of Cancer and Pathogenic Microbes

open access: yesBiomolecules, 2022
As the technologies for peptide synthesis and development continue to mature, antimicrobial peptides (AMPs) are being widely studied as significant contributors in medicinal chemistry research. Furthermore, the advancement in the synthesis of dendrimers’
Arif Iftikhar Khan   +9 more
doaj   +1 more source

Applying Grover's Algorithm to Hash Functions: A Software Perspective

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj   +1 more source

Enhanced immunogenicity of stabilized trimeric soluble influenza hemagglutinin. [PDF]

open access: yesPLoS ONE, 2010
The recent swine-origin H1N1 pandemic illustrates the need to develop improved procedures for rapid production of influenza vaccines. One alternative to the current egg-based manufacture of influenza vaccine is to produce a hemagglutinin (HA) subunit ...
William C Weldon   +5 more
doaj   +1 more source

Search framework for neutral bits and boomerangs in SHA‐1 collision attacks

open access: yesIET Information Security, 2023
Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and boomerangs is ...
Degang Li, Yang Yang, Guang Zeng
doaj   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

The Analysis of Minimum Distribution to Each Mustahiq and Its Relevance to Zakat al-Fitr Obligation to All Muslims

open access: yesWaraqat: Jurnal Ilmu-Ilmu Keislaman, 2022
This study aims to analyze the minimum needs of Zakat al-Fitr distributed to Mustahiq so they do not beg on Eid al-Fitr and can pay Zakat al-fitr. Being Muslims, fuqaraa and masakeen as priority recipients of Zakat al-Fitr are also obliged to pay Zakat ...
Muhammad Nurul Alim
doaj   +1 more source

Home - About - Disclaimer - Privacy