Results 41 to 50 of about 37,018 (310)

Hardware authentication based on PUFs and SHA-3 2nd round candidates [PDF]

open access: yes, 2010
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted.
Baturone Castillo, María Iluminada   +1 more
core   +1 more source

Optimizing FPGA Resource Allocation for SHA-3 Using DSP48 and Pipelining Techniques

open access: yesInternational Islamic University Malaysia Engineering Journal
Deploying SHA-3 on FPGA devices requires significant resource allocation; however, the resulting throughput still needs improvement. This study employs the DSP48 module on the Xilinx FPGA to address this issue and implements an eight-stage pipeline ...
Agfianto Eko Putra   +2 more
doaj   +1 more source

Engineering of Antimicrobial Surfaces by Using Temporin Analogs to Tune the Biocidal/antiadhesive Effect

open access: yesMolecules, 2019
Proliferation of resistant bacteria on biomaterials is a major problem leading to nosocomial infections. Due to their broad-spectrum activity and their ability to disrupt bacterial membranes through a rapid membranolytic mechanism, antimicrobial peptides
Pierre-Carl Oger   +3 more
doaj   +1 more source

An Investigation of Precise Orbit and Clock Products for BDS-3 from Different Analysis Centers

open access: yesSensors, 2021
A quality evaluation of precise products for BDS-3 constellations is presented for the first time in this contribution. Then, the tropospheric delay retrieval and positioning performance of BDS-3 precise point positioning (PPP) solutions using the ...
Pengli Shen   +4 more
doaj   +1 more source

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)

open access: yesJISR on Computing
Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and ...
Kisakye Diana Michelle   +2 more
doaj   +1 more source

Parallel and High Speed Hashing in GPU for Telemedicine Applications

open access: yesIEEE Access, 2018
With the advent of a telemedicine technology, many medical services can be provided remotely, which greatly enhances the welfare of our mankind. However, security and privacy of medical data transmitted through telecommunication systems remain a serious ...
Wai-Kong Lee   +5 more
doaj   +1 more source

Insight into the mechanism of action of temporin-SHa, a new broad-spectrum antiparasitic and antibacterial agent. [PDF]

open access: yesPLoS ONE, 2017
Antimicrobial peptides (AMPs) are promising drugs to kill resistant pathogens. In contrast to bacteria, protozoan parasites, such as Leishmania, were little studied. Therefore, the antiparasitic mechanism of AMPs is still unclear.
Zahid Raja   +11 more
doaj   +1 more source

A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies

open access: yes, 2020
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios   +4 more
core   +2 more sources

Reference intervals of serum hyaluronic acid corresponding to the radiographic severity of knee osteoarthritis in women

open access: yesBMC Musculoskeletal Disorders, 2013
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka   +14 more
doaj   +1 more source

Home - About - Disclaimer - Privacy