Results 81 to 90 of about 3,272 (163)

Antibiofilm Activity and Biocompatibility of Temporin-SHa: A Promising Antimicrobial Peptide for Control of Fluconazole-Resistant Candida albicans

open access: yesMicroorganisms
The aim of the study was to investigate the effect of antimicrobial peptides (AMPs) Hylin−a1, KR−12-a5, and Temporin-SHa in Candida albicans as well as the biocompatibility of keratinocytes spontaneously immortalized (NOK-si) and human gingival ...
Luana Mendonça Dias   +6 more
doaj   +1 more source

A Combination of SHA-256 and DES for Visual Data Protection

open access: yesJurnal Masyarakat Informatika
This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly
Aristides Bima Wintaka   +3 more
doaj   +1 more source

Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants

open access: yesCryptography
The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions.
Riley Vaughn, Mike Borowczak
doaj   +1 more source

Secure Message Hashing with SHA-256: Cryptographic Implementation

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Hash Functions are fundamental devices in the information security on the internet. The hash function used in various security applications are known as cryptographic hash function. The cryptographic hash function plays a crucial role in cryptography to ensure certain security objectives.
openaire   +1 more source

Linear and Differential Cryptanalysis of SHA-256

open access: yesLinear and Differential Cryptanalysis of SHA-256
The one-way hash function plays an important role in digital signatures and message authentication from the viewpoint of security. No effective attacking method has been discovered to the algorithm of hash function standard. In this study, we tried to attack SHA-256 in encryption mode using linear and differential cryptanalysis to solve a private key ...
openaire  

Cryptanalysis the SHA-256 Hash Function using Rainbow Tables

open access: yesIndonesian Journal of Electrical Engineering and Informatics (IJEEI), 2022
Olga Manankova   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy