Results 21 to 30 of about 32,391 (267)

Algebraic Fault Analysis of SHA-256 Compression Function and Its Application

open access: yesInformation, 2021
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Kazuki Nakamura   +2 more
doaj   +1 more source

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN   +4 more
doaj   +3 more sources

Long-term outcomes of coils embolization for superior hypophyseal artery aneurysms

open access: yesFrontiers in Neurology, 2023
ObjectiveSuperior hypophyseal artery (SHA) aneurysms are intradural, and their rupture can result in subarachnoid hemorrhage. Considering the related surgical difficulty and anatomical restrictions, endovascular treatment (EVT) is considered the most ...
Yan-Po Kang   +11 more
doaj   +1 more source

Effects of Stephania hainanensis alkaloids on MSU-induced acute gouty arthritis in mice

open access: yesBMC Complementary Medicine and Therapies, 2021
Background Gout is initiated by the precipitation of monosodium urate (MSU) crystals within the joints and soft tissues, and it can eventually cause acute or chronic arthritis.
Hao-fei Fan   +8 more
doaj   +1 more source

Lightweight protection of cryptographic hardware accelerators against differential fault analysis [PDF]

open access: yes, 2020
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new ...
Canal Corretger, Ramon   +3 more
core   +1 more source

Secure Hash Algorithm-2 formed on DNA

open access: yesJournal of the Egyptian Mathematical Society, 2019
We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first attempt to present the implementation of SHA-2 using DNA data processing.
Dieaa I. Nassr
doaj   +1 more source

Finding Collisions against 4-Round SHA-3-384 in Practical Time

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang   +3 more
doaj   +1 more source

Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code [PDF]

open access: yes, 2021
Side-channel attacks are a major threat to the security of cryptographic implementations, particularly for small devices that are under the physical control of the adversary. While several strategies for protecting against side-channel attacks exist, these often fail in practice due to unintended interactions between values deep within the CPU.
arxiv   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine

open access: yesGels, 2021
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy