Results 41 to 50 of about 37,018 (310)
Hardware authentication based on PUFs and SHA-3 2nd round candidates [PDF]
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Baturone Castillo, María Iluminada +1 more
core +1 more source
Optimizing FPGA Resource Allocation for SHA-3 Using DSP48 and Pipelining Techniques
Deploying SHA-3 on FPGA devices requires significant resource allocation; however, the resulting throughput still needs improvement. This study employs the DSP48 module on the Xilinx FPGA to address this issue and implements an eight-stage pipeline ...
Agfianto Eko Putra +2 more
doaj +1 more source
Proliferation of resistant bacteria on biomaterials is a major problem leading to nosocomial infections. Due to their broad-spectrum activity and their ability to disrupt bacterial membranes through a rapid membranolytic mechanism, antimicrobial peptides
Pierre-Carl Oger +3 more
doaj +1 more source
An Investigation of Precise Orbit and Clock Products for BDS-3 from Different Analysis Centers
A quality evaluation of precise products for BDS-3 constellations is presented for the first time in this contribution. Then, the tropospheric delay retrieval and positioning performance of BDS-3 precise point positioning (PPP) solutions using the ...
Pengli Shen +4 more
doaj +1 more source
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and ...
Kisakye Diana Michelle +2 more
doaj +1 more source
Parallel and High Speed Hashing in GPU for Telemedicine Applications
With the advent of a telemedicine technology, many medical services can be provided remotely, which greatly enhances the welfare of our mankind. However, security and privacy of medical data transmitted through telecommunication systems remain a serious ...
Wai-Kong Lee +5 more
doaj +1 more source
Insight into the mechanism of action of temporin-SHa, a new broad-spectrum antiparasitic and antibacterial agent. [PDF]
Antimicrobial peptides (AMPs) are promising drugs to kill resistant pathogens. In contrast to bacteria, protozoan parasites, such as Leishmania, were little studied. Therefore, the antiparasitic mechanism of AMPs is still unclear.
Zahid Raja +11 more
doaj +1 more source
A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios +4 more
core +2 more sources
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka +14 more
doaj +1 more source

