Results 21 to 30 of about 22,218,864 (289)
Objective To compare the efficacy and prognosis of reverse total shoulder arthroplasty (rTSA) with shoulder hemiarthroplasty (SHA) using devitalized autograft or allograft composite reconstruction after proximal humeral tumor resection.
Dongqing Zuo +10 more
doaj +1 more source
Routing Using Trust Based System with SHA-2 Authentication
Ravilla Dilli +1 more
openalex +2 more sources
Algebraic Fault Analysis of SHA-256 Compression Function and Its Application
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Kazuki Nakamura +2 more
doaj +1 more source
Long-term outcomes of coils embolization for superior hypophyseal artery aneurysms
ObjectiveSuperior hypophyseal artery (SHA) aneurysms are intradural, and their rupture can result in subarachnoid hemorrhage. Considering the related surgical difficulty and anatomical restrictions, endovascular treatment (EVT) is considered the most ...
Yan-Po Kang +11 more
doaj +1 more source
New hash function based on C-MD structure and chaotic neural network
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN +4 more
doaj +3 more sources
Exhibiting Sha[2] on hyperelliptic jacobians [PDF]
We discuss approaches to computing in the Shafarevich-Tate group of Jacobians of higher genus curves, with an emphasis on the theory and practice of visualisation.
Bruin, N., Flynn, E. V.
core +4 more sources
Effects of Stephania hainanensis alkaloids on MSU-induced acute gouty arthritis in mice
Background Gout is initiated by the precipitation of monosodium urate (MSU) crystals within the joints and soft tissues, and it can eventually cause acute or chronic arthritis.
Hao-fei Fan +8 more
doaj +1 more source
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi +1 more
core +4 more sources
Finding Collisions against 4-Round SHA-3-384 in Practical Time
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang +3 more
doaj +1 more source
Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh +2 more
doaj +1 more source

