Results 31 to 40 of about 22,218,864 (289)
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir +6 more
core +2 more sources
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova +2 more
doaj +1 more source
Efficient computation of hashes [PDF]
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
+16 more
core +3 more sources
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka +14 more
doaj +1 more source
Stressor- and Corticotropin releasing Factor-induced Reinstatement and Active Stress-related Behavioral Responses are Augmented Following Long-access Cocaine Self-administration by Rats [PDF]
Rationale Stressful events during periods of drug abstinence likely contribute to relapse in cocaine-dependent individuals. Excessive cocaine use may increase susceptibility to stressor-induced relapse through alterations in brain corticotropin-releasing
AM Basso +62 more
core +2 more sources
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
As the most powerful tool for tight gas prediction and exploration in the second member of the Shaximiao Formation (Sha 2 Member) in the Sichuan Basin, the technique of bright spot fails to deliver satisfactory results in the Sha 1 Member. To address the
Ming Zhang +4 more
doaj +1 more source
Proliferation of resistant bacteria on biomaterials is a major problem leading to nosocomial infections. Due to their broad-spectrum activity and their ability to disrupt bacterial membranes through a rapid membranolytic mechanism, antimicrobial peptides
Pierre-Carl Oger +3 more
doaj +1 more source
Performance Analysis of Sha-2 and Sha-3 Finalists
Jagdish Bhatta Ram Krishna Dahal
openalex +2 more sources
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources

