Results 41 to 50 of about 32,440 (142)

Concurrent Error Detection for Reliable SHA-3 Design [PDF]

open access: yesProceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016
Cryptographic systems are vulnerable to random errors and injected faults. Soft errors can inadvertently happen in critical cryptographic modules and attackers can inject faults into systems to retrieve the embedded secret. Different schemes have been developed to improve the security and reliability of cryptographic systems. As the new SHA-3 standard,
Pei Luo, Cheng Li, Yunsi Fei
openaire   +1 more source

Design & Characterization of SHA 3- 256 Bit IP Core

open access: yesProcedia Technology, 2016
AbstractIn the era of internet and computer networking the need for security have increased rapidly. Various crypto algorithms are used for secured data transmission and reception through the network, of which hash function possess a key role in various cryptographic protocols. Keccak algorithm is the winner of SHA-3 competition conducted by NIST.
James, Jeethu   +2 more
openaire   +1 more source

Effects of Isometric Hip Extension Using Thera-band on Hip Muscle Activities During Side-lying Hip Abduction Exercise in Participants With Gluteus Medius Weakness

open access: yesPhysical Therapy Korea
Background: Weakness of gluteus medius (Gmed) is related with musculoskeletal disorders. Individuals who experience weakness in the Gmed may activate the tensor fasciae latae (TFL) as a compensatory mechanism. Application of isometric hip extension (IHE)
Sae-hwa Kim   +4 more
doaj   +1 more source

Adult Prader-Willi Syndrome: An Update on Management

open access: yesCase Reports in Genetics, 2016
With the advancement of medical care, the survival of most patients with syndromal genetic disease is greatly improved. In this case report, we have reported an adult Prader-Willi syndrome patient who is being diagnosed at the age of 33.
Luk Ho-Ming
doaj   +1 more source

Side-Channel Analysis of Six SHA-3 Candidates [PDF]

open access: yes, 2010
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side ...
Olivier Benoît, Thomas Peyrin
openaire   +1 more source

Analisis Algoritma SHA-3 Keamanan pada Data Pribadi

open access: yesJURNAL TECNOSCIENZA, 2021
Data Pribadi merupakan data yang harus dilindungi di era yang serba internet ini. Karena data tersebut berisi informasi penting yang bisa saja menjadi sasaran cyber crime.Beberapa tahun terakhir marak terjadi kasus penyerangan atau hacking yang mengambil data dan digunakan tidak semestinya oleh orang yang tidak bertanggung jawab.
openaire   +2 more sources

On security arguments of the second round SHA-3 candidates [PDF]

open access: yesInternational Journal of Information Security, 2012
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round.
Andreeva, Elena   +4 more
openaire   +2 more sources

Efficiency System-level SHA-3 Accelerator for IoT

open access: yes, 2023
Edge computing has emerged as a significant computing trend alongside the rapid expansion of the Internet of Things (IoT). Computing operations at the network’s edge offer a solution to the high latency and service overload challenges often associated with cloud computing.
Thuan Huu Huynh   +4 more
openaire   +1 more source

Mussel-inspired sulfated hyaluronan cryogel patch with antioxidant, anti-inflammatory, and drug-loading properties for multifunctional wound adhesives

open access: yesBioactive Materials
Wounds, characterized by the disruption of the continuity of body tissues resulting from external trauma, manifest in diverse types and locations. Although numerous wound dressings are available for various wound scenarios, it remains challenging to find
Wonmoon Song   +5 more
doaj   +1 more source

Synthesis of Second-Generation Analogs of Temporin-SHa Peptide Having Broad-Spectrum Antibacterial and Anticancer Effects

open access: yesAntibiotics
Antimicrobial peptides (AMPs) are a promising class of therapeutic alternatives with broad-spectrum activity against resistant pathogens. Small AMPs like temporin-SHa (1) and its first-generation analog [G10a]-SHa (2) possess notable efficacy against ...
Arif Iftikhar Khan   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy