Results 41 to 50 of about 35,561 (292)
Efficient computation of hashes [PDF]
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
+16 more
core +3 more sources
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka +14 more
doaj +1 more source
Stressor- and Corticotropin releasing Factor-induced Reinstatement and Active Stress-related Behavioral Responses are Augmented Following Long-access Cocaine Self-administration by Rats [PDF]
Rationale Stressful events during periods of drug abstinence likely contribute to relapse in cocaine-dependent individuals. Excessive cocaine use may increase susceptibility to stressor-induced relapse through alterations in brain corticotropin-releasing
AM Basso +62 more
core +2 more sources
Protein Adsorbate Biohybrids and Sequential Hystallosteric Protein Adsorption
Protein adsorption on solid surfaces is characterized by multivalence, binding-unit overlap, sequential adsorption, surface allosterics, lateral interactions and pronounced adsorption-desorption hysteresis, giving rise to the sequential, hystallosteric ...
Jennissen Herbert P.
doaj +1 more source
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
A new hash family obtained by modifying the SHA-2 family [PDF]
In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2. Small modifications to the SHA-2 design are suggested to thwart these attacks. The modified round function provides the same resistance to linearization attacks as the original SHA-2 round function, but ...
Somitra Kumar Sanadhya, Palash Sarkar
openaire +1 more source
Wounds, characterized by the disruption of the continuity of body tissues resulting from external trauma, manifest in diverse types and locations. Although numerous wound dressings are available for various wound scenarios, it remains challenging to find
Wonmoon Song +5 more
doaj +1 more source
Proliferation of resistant bacteria on biomaterials is a major problem leading to nosocomial infections. Due to their broad-spectrum activity and their ability to disrupt bacterial membranes through a rapid membranolytic mechanism, antimicrobial peptides
Pierre-Carl Oger +3 more
doaj +1 more source
Custom ASIC Design for SHA-256 Using Open-Source Tools
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and ...
Lucas Daudt Franck +4 more
doaj +1 more source
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources

