Results 41 to 50 of about 32,440 (142)
Concurrent Error Detection for Reliable SHA-3 Design [PDF]
Cryptographic systems are vulnerable to random errors and injected faults. Soft errors can inadvertently happen in critical cryptographic modules and attackers can inject faults into systems to retrieve the embedded secret. Different schemes have been developed to improve the security and reliability of cryptographic systems. As the new SHA-3 standard,
Pei Luo, Cheng Li, Yunsi Fei
openaire +1 more source
Design & Characterization of SHA 3- 256 Bit IP Core
AbstractIn the era of internet and computer networking the need for security have increased rapidly. Various crypto algorithms are used for secured data transmission and reception through the network, of which hash function possess a key role in various cryptographic protocols. Keccak algorithm is the winner of SHA-3 competition conducted by NIST.
James, Jeethu +2 more
openaire +1 more source
Background: Weakness of gluteus medius (Gmed) is related with musculoskeletal disorders. Individuals who experience weakness in the Gmed may activate the tensor fasciae latae (TFL) as a compensatory mechanism. Application of isometric hip extension (IHE)
Sae-hwa Kim +4 more
doaj +1 more source
Adult Prader-Willi Syndrome: An Update on Management
With the advancement of medical care, the survival of most patients with syndromal genetic disease is greatly improved. In this case report, we have reported an adult Prader-Willi syndrome patient who is being diagnosed at the age of 33.
Luk Ho-Ming
doaj +1 more source
Side-Channel Analysis of Six SHA-3 Candidates [PDF]
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side ...
Olivier Benoît, Thomas Peyrin
openaire +1 more source
Analisis Algoritma SHA-3 Keamanan pada Data Pribadi
Data Pribadi merupakan data yang harus dilindungi di era yang serba internet ini. Karena data tersebut berisi informasi penting yang bisa saja menjadi sasaran cyber crime.Beberapa tahun terakhir marak terjadi kasus penyerangan atau hacking yang mengambil data dan digunakan tidak semestinya oleh orang yang tidak bertanggung jawab.
openaire +2 more sources
On security arguments of the second round SHA-3 candidates [PDF]
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round.
Andreeva, Elena +4 more
openaire +2 more sources
Efficiency System-level SHA-3 Accelerator for IoT
Edge computing has emerged as a significant computing trend alongside the rapid expansion of the Internet of Things (IoT). Computing operations at the network’s edge offer a solution to the high latency and service overload challenges often associated with cloud computing.
Thuan Huu Huynh +4 more
openaire +1 more source
Wounds, characterized by the disruption of the continuity of body tissues resulting from external trauma, manifest in diverse types and locations. Although numerous wound dressings are available for various wound scenarios, it remains challenging to find
Wonmoon Song +5 more
doaj +1 more source
Antimicrobial peptides (AMPs) are a promising class of therapeutic alternatives with broad-spectrum activity against resistant pathogens. Small AMPs like temporin-SHa (1) and its first-generation analog [G10a]-SHa (2) possess notable efficacy against ...
Arif Iftikhar Khan +8 more
doaj +1 more source

