Results 31 to 40 of about 32,432 (238)
Study Security Cloud with SHA-2 Algorithm
This study explores the relationship between cloud computing and security, concentrating on the use of the SHA-2 cryptographic algorithm. Due to the distributed and shared nature of cloud settings, cloud computing has transformed how information and services are accessed and provided. However, it has also created new security issues.
openaire +2 more sources
Preimage Attacks on Reduced Tiger and SHA-2 [PDF]
This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2128.5. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2161. The proposed attack is based on meet-in-the-middle attacks.
Takanori Isobe, Kyoji Shibutani
openaire +1 more source
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
Sanadhya, Somitra Kumar, Sarkar, Palash
openaire +2 more sources
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2 [PDF]
The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications.
Hassen Mestiri +3 more
openaire +1 more source
Antimicrobial peptide (AMP)‐loaded nanocarriers provide a multifunctional strategy to combat drug‐resistant Mycobacterium tuberculosis. By enhancing intracellular delivery, bypassing efflux pumps, and disrupting bacterial membranes, this platform restores phagolysosome fusion and macrophage function.
Christian S. Carnero Canales +11 more
wiley +1 more source
Flexoelectrically Induced Polar Topology in Twisted SrTiO3 Membranes
Twisted SrTiO3 bilayers host polar vortices of flexoelectric origin, revealed through combined experiment and theory. By reconstructing polarization from the toroidal moment of strain gradients, the work establishes a 3D chiral state with broken inversion and mirror symmetries.
Isabel Tenreiro +13 more
wiley +1 more source
Protein Adsorbate Biohybrids and Sequential Hystallosteric Protein Adsorption
Protein adsorption on solid surfaces is characterized by multivalence, binding-unit overlap, sequential adsorption, surface allosterics, lateral interactions and pronounced adsorption-desorption hysteresis, giving rise to the sequential, hystallosteric ...
Jennissen Herbert P.
doaj +1 more source
Recent Advances of Slip Sensors for Smart Robotics
This review summarizes recent progress in robotic slip sensors across mechanical, electrical, thermal, optical, magnetic, and acoustic mechanisms, offering a comprehensive reference for the selection of slip sensors in robotic applications. In addition, current challenges and emerging trends are identified to advance the development of robust, adaptive,
Xingyu Zhang +8 more
wiley +1 more source
Proliferation of resistant bacteria on biomaterials is a major problem leading to nosocomial infections. Due to their broad-spectrum activity and their ability to disrupt bacterial membranes through a rapid membranolytic mechanism, antimicrobial peptides
Pierre-Carl Oger +3 more
doaj +1 more source
Routing Using Trust Based System with SHA-2 Authentication
AbstractMobile Ad hoc NETwork (MANET) is an infrastructure independent network with every mobile node acting as the router in the network formation. These networks are most useful when the present infrastructure is destroyed or at remote locations which are deprived of these amenities.
Ravilla, Dilli +1 more
openaire +1 more source

