Results 31 to 40 of about 21,521,866 (302)

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN   +4 more
doaj   +3 more sources

Long-term outcomes of coils embolization for superior hypophyseal artery aneurysms

open access: yesFrontiers in Neurology, 2023
ObjectiveSuperior hypophyseal artery (SHA) aneurysms are intradural, and their rupture can result in subarachnoid hemorrhage. Considering the related surgical difficulty and anatomical restrictions, endovascular treatment (EVT) is considered the most ...
Yan-Po Kang   +11 more
doaj   +1 more source

Effects of Stephania hainanensis alkaloids on MSU-induced acute gouty arthritis in mice

open access: yesBMC Complementary Medicine and Therapies, 2021
Background Gout is initiated by the precipitation of monosodium urate (MSU) crystals within the joints and soft tissues, and it can eventually cause acute or chronic arthritis.
Hao-fei Fan   +8 more
doaj   +1 more source

Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code [PDF]

open access: yes, 2021
Side-channel attacks are a major threat to the security of cryptographic implementations, particularly for small devices that are under the physical control of the adversary. While several strategies for protecting against side-channel attacks exist, these often fail in practice due to unintended interactions between values deep within the CPU.
arxiv   +1 more source

Secure Hash Algorithm-2 formed on DNA

open access: yesJournal of the Egyptian Mathematical Society, 2019
We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first attempt to present the implementation of SHA-2 using DNA data processing.
Dieaa I. Nassr
doaj   +1 more source

Finding Collisions against 4-Round SHA-3-384 in Practical Time

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang   +3 more
doaj   +1 more source

Poor expression of miR‐195‐5p can assist the diagnosis of cerebral vasospasm after subarachnoid hemorrhage and predict adverse outcomes

open access: yesBrain and Behavior, Volume 12, Issue 12, December 2022., 2022
Abstract Objective Patients with spontaneous subarachnoid hemorrhage (SAH) may develop refractory arterial cerebral vasospasm (CVS), which is the leading cause of death in SAH patients. This study explored the clinical diagnostic value of serum miR‐195‐5p levels in CVS after SAH (SAH + CVS) and its relationship with the prognosis of SAH + CVS.
Yong Li   +3 more
wiley   +1 more source

Dynamic Friction Model for the Investigation of Stick‐Slip Oscillations

open access: yesChemical Engineering &Technology, Volume 46, Issue 1, Page 29-36, January 2023., 2023
An efficient dynamic friction model based on the Stribeck curve is presented, which allows to investigate the influencing parameters on the stick‐slip effect through finite element simulations. The simulation of a tribometer test proofs that the model correlates well with the tribometer test results.
Martin Wittmaack   +2 more
wiley   +1 more source

Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine

open access: yesGels, 2021
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy