Results 51 to 60 of about 32,440 (142)
Biomimetic chitosan/alginate with zinc and strontium hydroxyapatite for periodontal regeneration application [PDF]
Objective(s): To evaluate the potential of a novel alginate/chitosan/Zinc-strontium hydroxyapatite (AG/CS/SHA) composite scaffold for periodontal tissue regeneration by assessing its biocompatibility, bioactivity, and degradation characteristics ...
Suresh Munusamy +3 more
doaj +1 more source
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions. [PDF]
Eledlebi K +5 more
europepmc +1 more source
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. [PDF]
Torres-Alvarado A +5 more
europepmc +1 more source
Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the
Kevin Atighehchi, Alexis Bonnecaze
doaj +1 more source
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions.
Yaser Jararweh +3 more
openaire +2 more sources
Noratep Kulachote,1 Paphon Sa-Ngasoongsong,1 Siwadol Wongsak,1 Kulapat Chulsomlee,2 Chavarat Jarungvittayakon,1 Praman Fuangfa,3 Viroj Kawinwonggowit,1 Pornchai Mulpruek1 1Department of Orthopedics, Faculty of Medicine Ramathibodi Hospital, Mahidol ...
Kulachote N +7 more
doaj
The spin Hall angle (SHA) represents the efficiency of the conversion between spin current into charge current and vice-versa. In this paper, we report the experimental detection of large enhancement of the effective SHA in heterostructures of yttrium ...
O. Alves Santos +5 more
doaj +1 more source
In this bachelor thesis SHA-3 standard, this standard’s origin, design, method of its operating, as well as its uses and advantages over its predecessors were described. The properties of hash functions in general and various examples of their application are shown. The chronology of the formation of the SHA-3 standard is presented and its predecessors
openaire +1 more source
Precise boundary element method for non-horizontally layered foundations and its applications
A new boundary element method (BEM) is developed for accurately calculating the additional stresses and settlements in non-horizontally layered foundations.
XIAO Sha 1 , YUE Zhongqi 2, 3
doaj +1 more source
Design of an Energy-Efficient SHA-3 Accelerator on Artix-7 FPGA for Secure Network Applications
As the demand for secure communication and data integrity in embedded and networked systems continues to grow, there is an increasing need for cryptographic solutions that provide robust security while efficiently using energy and hardware resources ...
Abdulmunem A. Abdulsamad +1 more
doaj +1 more source

