Results 31 to 40 of about 22,218,864 (289)

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]

open access: yes, 2010
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir   +6 more
core   +2 more sources

Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine

open access: yesGels, 2021
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova   +2 more
doaj   +1 more source

Efficient computation of hashes [PDF]

open access: yes, 2014
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
  +16 more
core   +3 more sources

Reference intervals of serum hyaluronic acid corresponding to the radiographic severity of knee osteoarthritis in women

open access: yesBMC Musculoskeletal Disorders, 2013
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka   +14 more
doaj   +1 more source

Stressor- and Corticotropin releasing Factor-induced Reinstatement and Active Stress-related Behavioral Responses are Augmented Following Long-access Cocaine Self-administration by Rats [PDF]

open access: yes, 2008
Rationale Stressful events during periods of drug abstinence likely contribute to relapse in cocaine-dependent individuals. Excessive cocaine use may increase susceptibility to stressor-induced relapse through alterations in brain corticotropin-releasing
AM Basso   +62 more
core   +2 more sources

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Application of multicomponent seismic in tight reservoir prediction of the first member of Jurassic Shaximiao Formation, Sichuan Basin, China

open access: yesJournal of Natural Gas Geoscience
As the most powerful tool for tight gas prediction and exploration in the second member of the Shaximiao Formation (Sha 2 Member) in the Sichuan Basin, the technique of bright spot fails to deliver satisfactory results in the Sha 1 Member. To address the
Ming Zhang   +4 more
doaj   +1 more source

Engineering of Antimicrobial Surfaces by Using Temporin Analogs to Tune the Biocidal/antiadhesive Effect

open access: yesMolecules, 2019
Proliferation of resistant bacteria on biomaterials is a major problem leading to nosocomial infections. Due to their broad-spectrum activity and their ability to disrupt bacterial membranes through a rapid membranolytic mechanism, antimicrobial peptides
Pierre-Carl Oger   +3 more
doaj   +1 more source

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Home - About - Disclaimer - Privacy