نتایج جستجو برای: fischerella sp sha
تعداد نتایج: 122273 فیلتر نتایج به سال:
We present new software speed records for several popular hash functions on low-end 8-bit AVR microcontrollers. Target algorithms include widely deployed hash functions like SHA-1 and SHA-256 as well as the SHA-3 (second round) candidates Blake-32 and Skein-256. A significant aspect of our implementations is that they reduce the overall resource requirements, improving not only execution time b...
In this paper, we propose a unified architecture adapted to the field of embedded systems which combines commonly used hash algorithms in a single design in order to reduce area requirements and optimize the maximum frequency. We present an implementation of three hash functions: MD5 [8], SHA-1 [9] and SHA-2 [10]. Many similarities exist between these algorithms which help us to move towards a ...
Neuropeptide S (NPS) has been shown to modulate arousal, sleep wakefulness, anxiety-like behavior, and feeding after central administration of the peptide agonist to mice or rats. We report here the chemical synthesis and pharmacological characterization of SHA 66 (3-oxo-1,1-diphenyl-tetrahydro-oxazolo[3,4-a]pyrazine-7-carboxylic acid benzylamide) and SHA 68 (3-oxo-1,1-diphenyl-tetrahydro-oxazo...
This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2. The proposed attack is based on meet-in-themiddle attacks. It seems difficult to find “independent words” of ...
Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-0, SHA-1 and RIPEMD-160 are built on Merkle-Damgård iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions a...
Well-controlled grafting of small hyaluronan oligosaccharides (sHA) enables novel approaches to investigate biological processes such as angiogenesis, immune reactions and cancer metastasis. We develop two strategies for covalent attachment of sHA, a fast high-density adsorption and a two-layer system that allows tuning the density and mode of immobilization. We monitored the sHA adlayer format...
The conventional seminal parameters like sperm density, motility, morphology, etc. are not perfect indicators of seminal functional quality. Hence, Seminal Hyaluronidase Activity (SHA) and Hypo-osmotic Swelling (HOS score) of sperms that evaluate healthy sperms of fertilizing potential, were studied in male partners of infertile couples. The semen samples were obtained, by masturbation after 4 ...
هدف اصلی از این مطالعه بررسی توانایی سیانوباکتری Fischerella ambigua ISC67 در تجزیه زیستی نفت خام و اثر نفت خام بر پاسخهای فیزیولوژیک این سیانوباکتر میباشد. در این مطالعه تجربی، سیانوباکتری Fischerella ambiguaISC67 از کلکسیون ریز جلبکها تهیه شد. نرخ رشد سیانوباکتری در آزمایه 1% نفت خام در طول موج nm 750 و مقدار کلروفیل در آزمایه های 5/0، 1، 2 و 4% نفت خام در طول موج nm 665 با استفاده از...
Biham and Chen proposed an attack on SHA-0 at Crypt 2004. In this paper, we apply the Biham-Chen attack to analyze SHAlike hash functions regarding pseudo-collision resistance and pseudorandomness. We present a scenario about how to attack SHA-like hash functions applying the Biham and Chen attack. Using this scenario, we present a differential attack on the MD5 hash function and a differential...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its internal compression function. This is the first practical break of the full SHA-1, reaching all 80 out of 80 steps, while only 10 days of computation on a 64 GPU cluster were necessary to perform the attack. This work builds on a continuous series of cryptanalytic advancements on SHA-1 since the theor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید