Results 81 to 90 of about 3,272 (163)
The aim of the study was to investigate the effect of antimicrobial peptides (AMPs) Hylin−a1, KR−12-a5, and Temporin-SHa in Candida albicans as well as the biocompatibility of keratinocytes spontaneously immortalized (NOK-si) and human gingival ...
Luana Mendonça Dias +6 more
doaj +1 more source
A Combination of SHA-256 and DES for Visual Data Protection
This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly
Aristides Bima Wintaka +3 more
doaj +1 more source
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions.
Riley Vaughn, Mike Borowczak
doaj +1 more source
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256. [PDF]
Zhu S, Zhu C, Wang W.
europepmc +1 more source
Secure Message Hashing with SHA-256: Cryptographic Implementation
Hash Functions are fundamental devices in the information security on the internet. The hash function used in various security applications are known as cryptographic hash function. The cryptographic hash function plays a crucial role in cryptography to ensure certain security objectives.
openaire +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
An efficient image encryption scheme based on Lorenz system and quantum-inspired walks. [PDF]
Karmany M +4 more
europepmc +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
Linear and Differential Cryptanalysis of SHA-256
The one-way hash function plays an important role in digital signatures and message authentication from the viewpoint of security. No effective attacking method has been discovered to the algorithm of hash function standard. In this study, we tried to attack SHA-256 in encryption mode using linear and differential cryptanalysis to solve a private key ...
openaire
Cryptanalysis the SHA-256 Hash Function using Rainbow Tables
Olga Manankova +2 more
openaire +1 more source

