Results 21 to 30 of about 37,018 (310)

Design, Synthesis and Characterization of [G10a]-Temporin SHa Dendrimers as Dual Inhibitors of Cancer and Pathogenic Microbes

open access: yesBiomolecules, 2022
As the technologies for peptide synthesis and development continue to mature, antimicrobial peptides (AMPs) are being widely studied as significant contributors in medicinal chemistry research. Furthermore, the advancement in the synthesis of dendrimers’
Arif Iftikhar Khan   +9 more
doaj   +1 more source

Penerapan Keamanan WSN Berbasis Algoritma RSA 2048 dan SHA-3 pada Pemantauan Suhu

open access: yesJurnal Teknologi dan Sistem Informasi, 2021
Pemantauan kondisi suatu keadaan dengan menggunakan sensor semakin dibutuhkan untuk mengamati perubahan kondisi dari waktu ke waktu. Data-data yang didapatkan sensor kemudian dikirimkan ke sistem pengumpul yang telah disiapkan melalui saluran jaringan ...
Syariful Ikhwan, Risa Farrid Christianti
doaj   +1 more source

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]

open access: yes, 2010
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir   +6 more
core   +2 more sources

SHA-3 on ARM11 Processors

open access: yesAnais do XIV Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2014), 2012
This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. We report new speed records for all of the six implemented functions. For example our implementation of the round-3 version of JH-256 is 35% faster than the fastest implementation of the ...
Peter Schwabe   +2 more
openaire   +4 more sources

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256, SHA ...
P. Karthik, P. Shanthi Bala
doaj   +1 more source

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

Efficient computation of hashes [PDF]

open access: yes, 2014
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
  +16 more
core   +3 more sources

Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
This article analyzes the dynamic power losses generated by various hardware implementations of the BLAKE3 hash function. Estimations of the parameters were based on the results of post-route simulations of designs implemented in Xilinx Spartan-7 FPGAs ...
Jarosław Sugier
doaj   +3 more sources

Do reverse total shoulder replacements have better clinical and functional outcomes than hemiarthroplasty for patients undergoing proximal humeral tumor resection using devitalized autograft composite reconstruction: a case-control study

open access: yesJournal of Orthopaedic Surgery and Research, 2021
Objective To compare the efficacy and prognosis of reverse total shoulder arthroplasty (rTSA) with shoulder hemiarthroplasty (SHA) using devitalized autograft or allograft composite reconstruction after proximal humeral tumor resection.
Dongqing Zuo   +10 more
doaj   +1 more source

Practical Collision Attacks against Round-Reduced SHA-3 [PDF]

open access: yesJournal of Cryptology, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Guo, Jian   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy