Results 81 to 90 of about 37,018 (310)

Design & Characterization of SHA 3- 256 Bit IP Core

open access: yesProcedia Technology, 2016
AbstractIn the era of internet and computer networking the need for security have increased rapidly. Various crypto algorithms are used for secured data transmission and reception through the network, of which hash function possess a key role in various cryptographic protocols. Keccak algorithm is the winner of SHA-3 competition conducted by NIST.
James, Jeethu   +2 more
openaire   +1 more source

Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]

open access: yes, 2018
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core   +1 more source

Mechanism‐Driven Screening of Membrane‐Targeting and Pore‐Forming Antimicrobial Peptides

open access: yesAdvanced Science, EarlyView.
To combat antibiotic resistance, this study employs mechanism‐driven screening with machine learning to identify pore‐forming antimicrobial peptides from amphibian and human metaproteomes. Seven peptides are validated, showing minimal toxicity and membrane disruption.
Jiaxuan Li   +9 more
wiley   +1 more source

Effects of Isometric Hip Extension Using Thera-band on Hip Muscle Activities During Side-lying Hip Abduction Exercise in Participants With Gluteus Medius Weakness

open access: yesPhysical Therapy Korea
Background: Weakness of gluteus medius (Gmed) is related with musculoskeletal disorders. Individuals who experience weakness in the Gmed may activate the tensor fasciae latae (TFL) as a compensatory mechanism. Application of isometric hip extension (IHE)
Sae-hwa Kim   +4 more
doaj   +1 more source

Implementasi Algoritma Rijndael 128 Pada Aplikasi Chatting Berbasis Html5 Websocket [PDF]

open access: yes, 2014
In the past, web-based chat application didn\u27t consider security as part of must-have requirement, thus many insecure examples were broken in short time after it was released.
Lukito, Y. (Yuan)   +2 more
core  

A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies

open access: yes, 2019
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios   +3 more
core   +1 more source

Rib‐Reinforced Ultralight and Ultra‐Strong Shell Lattices

open access: yesAdvanced Science, EarlyView.
This study thoroughly reveals the relation between the curvature and stress direction of triply periodic minimal surface (TPMS) thin shell lattices and proposes a novel rib reinforcement design strategy to incorporate ribs along the line of asymptotes (LOA) and the line of principal curvatures (LOC) to enhance the strength of ultralight TPMS shell ...
Winston Wai Shing Ma   +6 more
wiley   +1 more source

Adult Prader-Willi Syndrome: An Update on Management

open access: yesCase Reports in Genetics, 2016
With the advancement of medical care, the survival of most patients with syndromal genetic disease is greatly improved. In this case report, we have reported an adult Prader-Willi syndrome patient who is being diagnosed at the age of 33.
Luk Ho-Ming
doaj   +1 more source

Side-Channel Analysis of Six SHA-3 Candidates [PDF]

open access: yes, 2010
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side ...
Olivier Benoît, Thomas Peyrin
openaire   +1 more source

09031 Abstracts Collection -- Symmetric Cryptography [PDF]

open access: yes, 2009
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy