Results 21 to 30 of about 32,432 (238)

Exhibiting SHA[2] on hyperelliptic Jacobians

open access: yesJournal of Number Theory, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bruin, N, Flynn, E
openaire   +4 more sources

Effects of Stephania hainanensis alkaloids on MSU-induced acute gouty arthritis in mice

open access: yesBMC Complementary Medicine and Therapies, 2021
Background Gout is initiated by the precipitation of monosodium urate (MSU) crystals within the joints and soft tissues, and it can eventually cause acute or chronic arthritis.
Hao-fei Fan   +8 more
doaj   +1 more source

Improving SHA-2 Hardware Implementations [PDF]

open access: yes, 2006
This paper proposes a set of new techniques to improve the implementation of the SHA-2 hashing algorithm. These techniques consist mostly in operation rescheduling and hardware reutilization, allowing a significant reduction of the critical path while the required area also decreases.
Ricardo Chaves   +3 more
openaire   +1 more source

Finding Collisions against 4-Round SHA-3-384 in Practical Time

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang   +3 more
doaj   +1 more source

Preimages for Step-Reduced SHA-2 [PDF]

open access: yes, 2009
In this paper, we present preimage attacks on up to 43-step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly increases the number of attacked steps compared to the best previously published preimage attack working for 24 steps.
Kazumaro Aoki   +4 more
openaire   +1 more source

Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2018
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh   +2 more
doaj   +1 more source

Performance Analysis of Sha-2 and Sha-3 Finalists

open access: yesInternational Journal on Cryptography and Information Security, 2013
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS.
Ram Krishna Dahal   +2 more
openaire   +2 more sources

Reference intervals of serum hyaluronic acid corresponding to the radiographic severity of knee osteoarthritis in women

open access: yesBMC Musculoskeletal Disorders, 2013
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka   +14 more
doaj   +1 more source

Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine

open access: yesGels, 2021
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova   +2 more
doaj   +1 more source

Application of multicomponent seismic in tight reservoir prediction of the first member of Jurassic Shaximiao Formation, Sichuan Basin, China

open access: yesJournal of Natural Gas Geoscience
As the most powerful tool for tight gas prediction and exploration in the second member of the Shaximiao Formation (Sha 2 Member) in the Sichuan Basin, the technique of bright spot fails to deliver satisfactory results in the Sha 1 Member. To address the
Ming Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy