Results 11 to 20 of about 22,218,864 (289)
SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol [PDF]
denis bider, M. Baushke
openalex +2 more sources
Performance analysis of SHA 2 and SHA 3
Swati Sharma, Loveneet, Saba Khanum
openalex +2 more sources
Design SHA-2 MIPS Processor Using FPGA [PDF]
Safaa S. Omran, Laith F. Jumma
openalex +2 more sources
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]
Hassen Mestiri +3 more
openalex +2 more sources
As the technologies for peptide synthesis and development continue to mature, antimicrobial peptides (AMPs) are being widely studied as significant contributors in medicinal chemistry research. Furthermore, the advancement in the synthesis of dendrimers’
Arif Iftikhar Khan +9 more
doaj +1 more source
Applying Grover's Algorithm to Hash Functions: A Software Perspective
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj +1 more source
Enhanced immunogenicity of stabilized trimeric soluble influenza hemagglutinin. [PDF]
The recent swine-origin H1N1 pandemic illustrates the need to develop improved procedures for rapid production of influenza vaccines. One alternative to the current egg-based manufacture of influenza vaccine is to produce a hemagglutinin (HA) subunit ...
William C Weldon +5 more
doaj +1 more source
Search framework for neutral bits and boomerangs in SHA‐1 collision attacks
Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and boomerangs is ...
Degang Li, Yang Yang, Guang Zeng
doaj +1 more source
Fast Implementation of SHA-3 in GPU Environment
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj +1 more source
This study aims to analyze the minimum needs of Zakat al-Fitr distributed to Mustahiq so they do not beg on Eid al-Fitr and can pay Zakat al-fitr. Being Muslims, fuqaraa and masakeen as priority recipients of Zakat al-Fitr are also obliged to pay Zakat ...
Muhammad Nurul Alim
doaj +1 more source

