Results 31 to 40 of about 21,521,866 (302)
New hash function based on C-MD structure and chaotic neural network
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN+4 more
doaj +3 more sources
Long-term outcomes of coils embolization for superior hypophyseal artery aneurysms
ObjectiveSuperior hypophyseal artery (SHA) aneurysms are intradural, and their rupture can result in subarachnoid hemorrhage. Considering the related surgical difficulty and anatomical restrictions, endovascular treatment (EVT) is considered the most ...
Yan-Po Kang+11 more
doaj +1 more source
Routing Using Trust Based System with SHA-2 Authentication
D. Ravilla, Chandra Shekar Reddy Putta
semanticscholar +2 more sources
Effects of Stephania hainanensis alkaloids on MSU-induced acute gouty arthritis in mice
Background Gout is initiated by the precipitation of monosodium urate (MSU) crystals within the joints and soft tissues, and it can eventually cause acute or chronic arthritis.
Hao-fei Fan+8 more
doaj +1 more source
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code [PDF]
Side-channel attacks are a major threat to the security of cryptographic implementations, particularly for small devices that are under the physical control of the adversary. While several strategies for protecting against side-channel attacks exist, these often fail in practice due to unintended interactions between values deep within the CPU.
arxiv +1 more source
Secure Hash Algorithm-2 formed on DNA
We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first attempt to present the implementation of SHA-2 using DNA data processing.
Dieaa I. Nassr
doaj +1 more source
Finding Collisions against 4-Round SHA-3-384 in Practical Time
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang+3 more
doaj +1 more source
Abstract Objective Patients with spontaneous subarachnoid hemorrhage (SAH) may develop refractory arterial cerebral vasospasm (CVS), which is the leading cause of death in SAH patients. This study explored the clinical diagnostic value of serum miR‐195‐5p levels in CVS after SAH (SAH + CVS) and its relationship with the prognosis of SAH + CVS.
Yong Li+3 more
wiley +1 more source
Dynamic Friction Model for the Investigation of Stick‐Slip Oscillations
An efficient dynamic friction model based on the Stribeck curve is presented, which allows to investigate the influencing parameters on the stick‐slip effect through finite element simulations. The simulation of a tribometer test proofs that the model correlates well with the tribometer test results.
Martin Wittmaack+2 more
wiley +1 more source
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples.
Maria A. Morosanova+2 more
doaj +1 more source