Results 61 to 70 of about 32,440 (142)

Integrated miRNA-seq and functional analyses reveal the regulatory role of sha-miR-92a_L + 2R + 4 via targeting vegfaa in rainbow trout (Oncorhynchus mykiss) responding to acute hypoxia and reoxygenation stress

open access: yesBMC Genomics
Background Hypoxia negatively affects the behavior, growth, reproduction and survival of fish, causing serious economic losses to aquaculture. Rainbow trout (Oncorhynchus mykiss), an important economic fish worldwide, belongs to a hypoxia-sensitive fish ...
Yongjuan Li   +3 more
doaj   +1 more source

Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]

open access: yesIACR Transactions on Symmetric Cryptology
Recently, linear structures and algebraic attacks have been widely used in preimage attacks on round-reduced Keccak. Inherited by pioneers’ work, we make some improvements for 3-round Keccak-256 and 4-round Keccak[r=640, c=160].
Xiaoen Lin, Le He, Hongbo Yu
doaj   +1 more source

Practical Preimage Attack on 5-Round Keccak[r=640, c=160]

open access: yesIACR Transactions on Symmetric Cryptology
Internal differential cryptanalysis has recently yielded a series of new results in the preimage cryptanalysis of round-reduced Keccak. While these existing attacks share a similar high-level framework, they differ in their technical details. This paper
Xiaoen Lin   +6 more
doaj   +1 more source

Secure Hash Algorithm SHA-3 [PDF]

open access: yesDatenschutz und Datensicherheit - DuD, 2013
openaire   +1 more source

Stabilised Hyaluronic Acid (sHA) gel as a novel marker for breast cancer tumour bed cavity: Surgical feasibility

open access: yesClinical and Translational Radiation Oncology
Introduction: Consistent delineation of the breast conserving surgery (BCS) tumour bed (TB) for breast cancer remains a challenge for radiation oncologists.
Janice Yeh   +12 more
doaj   +1 more source

SAT-based analysis of SHA-3 competition finalists

open access: yesNumerical Methods and Programming (Vychislitel'nye Metody i Programmirovanie)
Рассматриваются финалисты конкурса SHA-3, организованного для принятия нового стандарта криптографической хеш-функции. Все пять финалистов до сих пор являются стойкими к поиску прообраза, т.е. для них невозможно за реальное время найти вход по известному выходу.
openaire   +1 more source

Statistinė SHA-3 konkurso maišos funkcijų analizė

open access: yes, 2012
The main aim of my final master paper work was to gather theoretical basis, which provides description of cryptology and it‘s elements, valid hash function standards and NIST competition for SHA-3. During my studies I’ve gathered needed information to understand hash algorithms which are represented by five finalists of NIST SHA-3 competition.
openaire   +2 more sources

Cryptanalysis of SHA-3 Candidates: A Survey

open access: yesResearch Journal of Information Technology, 2013
Shilpa Chauhan   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy