Results 11 to 20 of about 32,432 (238)

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky   +6 more
doaj   +1 more source

Search framework for neutral bits and boomerangs in SHA‐1 collision attacks

open access: yesIET Information Security, 2023
Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and boomerangs is ...
Degang Li, Yang Yang, Guang Zeng
doaj   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Do reverse total shoulder replacements have better clinical and functional outcomes than hemiarthroplasty for patients undergoing proximal humeral tumor resection using devitalized autograft composite reconstruction: a case-control study

open access: yesJournal of Orthopaedic Surgery and Research, 2021
Objective To compare the efficacy and prognosis of reverse total shoulder arthroplasty (rTSA) with shoulder hemiarthroplasty (SHA) using devitalized autograft or allograft composite reconstruction after proximal humeral tumor resection.
Dongqing Zuo   +10 more
doaj   +1 more source

The Analysis of Minimum Distribution to Each Mustahiq and Its Relevance to Zakat al-Fitr Obligation to All Muslims

open access: yesWaraqat: Jurnal Ilmu-Ilmu Keislaman, 2022
This study aims to analyze the minimum needs of Zakat al-Fitr distributed to Mustahiq so they do not beg on Eid al-Fitr and can pay Zakat al-fitr. Being Muslims, fuqaraa and masakeen as priority recipients of Zakat al-Fitr are also obliged to pay Zakat ...
Muhammad Nurul Alim
doaj   +1 more source

Algebraic Fault Analysis of SHA-256 Compression Function and Its Application

open access: yesInformation, 2021
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Kazuki Nakamura   +2 more
doaj   +1 more source

Cryptanalysis of Dynamic SHA(2) [PDF]

open access: yes, 2009
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5.
Aumasson, Jean-Philippe   +3 more
openaire   +2 more sources

Long-term outcomes of coils embolization for superior hypophyseal artery aneurysms

open access: yesFrontiers in Neurology, 2023
ObjectiveSuperior hypophyseal artery (SHA) aneurysms are intradural, and their rupture can result in subarachnoid hemorrhage. Considering the related surgical difficulty and anatomical restrictions, endovascular treatment (EVT) is considered the most ...
Yan-Po Kang   +11 more
doaj   +1 more source

Visualising Sha[2] in Abelian surfaces [PDF]

open access: yesMathematics of Computation, 2004
Given an elliptic curve E1 over a number field and an element s in its 2-Selmer group, we give two different ways to construct infinitely many Abelian surfaces A such that the homogeneous space representing s occurs as a fibre of A over another elliptic curve E2.
openaire   +2 more sources

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN   +4 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy