Results 21 to 30 of about 21,521,866 (302)

Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model [PDF]

open access: hybrid, 2013
International audienceAs any algorithm manipulating secret data, HMAC is potentially vulnerable to side channel attacks. In 2007, McEvoy et al. proposed a differential power analysis attack against HMAC instantiated with hash functions from the SHA-2 ...
Sonia Belaïd   +4 more
openalex   +4 more sources

Enhanced immunogenicity of stabilized trimeric soluble influenza hemagglutinin. [PDF]

open access: yesPLoS ONE, 2010
The recent swine-origin H1N1 pandemic illustrates the need to develop improved procedures for rapid production of influenza vaccines. One alternative to the current egg-based manufacture of influenza vaccine is to produce a hemagglutinin (HA) subunit ...
William C Weldon   +5 more
doaj   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

The Analysis of Minimum Distribution to Each Mustahiq and Its Relevance to Zakat al-Fitr Obligation to All Muslims

open access: yesWaraqat: Jurnal Ilmu-Ilmu Keislaman, 2022
This study aims to analyze the minimum needs of Zakat al-Fitr distributed to Mustahiq so they do not beg on Eid al-Fitr and can pay Zakat al-fitr. Being Muslims, fuqaraa and masakeen as priority recipients of Zakat al-Fitr are also obliged to pay Zakat ...
Muhammad Nurul Alim
doaj   +1 more source

Search framework for neutral bits and boomerangs in SHA‐1 collision attacks

open access: yesIET Information Security, 2023
Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and boomerangs is ...
Degang Li, Yang Yang, Guang Zeng
doaj   +1 more source

Algebraic Fault Analysis of SHA-256 Compression Function and Its Application

open access: yesInformation, 2021
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Kazuki Nakamura   +2 more
doaj   +1 more source

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family

open access: bronzeIACR Cryptology ePrint Archive, 2012
D. Khovratovich   +2 more
semanticscholar   +2 more sources

Do reverse total shoulder replacements have better clinical and functional outcomes than hemiarthroplasty for patients undergoing proximal humeral tumor resection using devitalized autograft composite reconstruction: a case-control study

open access: yesJournal of Orthopaedic Surgery and Research, 2021
Objective To compare the efficacy and prognosis of reverse total shoulder arthroplasty (rTSA) with shoulder hemiarthroplasty (SHA) using devitalized autograft or allograft composite reconstruction after proximal humeral tumor resection.
Dongqing Zuo   +10 more
doaj   +1 more source

Lightweight protection of cryptographic hardware accelerators against differential fault analysis [PDF]

open access: yes, 2020
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new ...
Canal Corretger, Ramon   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy