Results 81 to 90 of about 37,018 (310)
Design & Characterization of SHA 3- 256 Bit IP Core
AbstractIn the era of internet and computer networking the need for security have increased rapidly. Various crypto algorithms are used for secured data transmission and reception through the network, of which hash function possess a key role in various cryptographic protocols. Keccak algorithm is the winner of SHA-3 competition conducted by NIST.
James, Jeethu +2 more
openaire +1 more source
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core +1 more source
Mechanism‐Driven Screening of Membrane‐Targeting and Pore‐Forming Antimicrobial Peptides
To combat antibiotic resistance, this study employs mechanism‐driven screening with machine learning to identify pore‐forming antimicrobial peptides from amphibian and human metaproteomes. Seven peptides are validated, showing minimal toxicity and membrane disruption.
Jiaxuan Li +9 more
wiley +1 more source
Background: Weakness of gluteus medius (Gmed) is related with musculoskeletal disorders. Individuals who experience weakness in the Gmed may activate the tensor fasciae latae (TFL) as a compensatory mechanism. Application of isometric hip extension (IHE)
Sae-hwa Kim +4 more
doaj +1 more source
Implementasi Algoritma Rijndael 128 Pada Aplikasi Chatting Berbasis Html5 Websocket [PDF]
In the past, web-based chat application didn\u27t consider security as part of must-have requirement, thus many insecure examples were broken in short time after it was released.
Lukito, Y. (Yuan) +2 more
core
A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios +3 more
core +1 more source
Rib‐Reinforced Ultralight and Ultra‐Strong Shell Lattices
This study thoroughly reveals the relation between the curvature and stress direction of triply periodic minimal surface (TPMS) thin shell lattices and proposes a novel rib reinforcement design strategy to incorporate ribs along the line of asymptotes (LOA) and the line of principal curvatures (LOC) to enhance the strength of ultralight TPMS shell ...
Winston Wai Shing Ma +6 more
wiley +1 more source
Adult Prader-Willi Syndrome: An Update on Management
With the advancement of medical care, the survival of most patients with syndromal genetic disease is greatly improved. In this case report, we have reported an adult Prader-Willi syndrome patient who is being diagnosed at the age of 33.
Luk Ho-Ming
doaj +1 more source
Side-Channel Analysis of Six SHA-3 Candidates [PDF]
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side ...
Olivier Benoît, Thomas Peyrin
openaire +1 more source
09031 Abstracts Collection -- Symmetric Cryptography [PDF]
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena +3 more
core +1 more source

