نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

Journal: :IACR Cryptology ePrint Archive 2012
Dag Arne Osvik

We present new software speed records for several popular hash functions on low-end 8-bit AVR microcontrollers. Target algorithms include widely deployed hash functions like SHA-1 and SHA-256 as well as the SHA-3 (second round) candidates Blake-32 and Skein-256. A significant aspect of our implementations is that they reduce the overall resource requirements, improving not only execution time b...

2008
Sylvain Ducloyer Romain Vaslin Guy Gogniat Eduardo Wanderley

In this paper, we propose a unified architecture adapted to the field of embedded systems which combines commonly used hash algorithms in a single design in order to reduce area requirements and optimize the maximum frequency. We present an implementation of three hash functions: MD5 [8], SHA-1 [9] and SHA-2 [10]. Many similarities exist between these algorithms which help us to move towards a ...

Journal: :The Journal of pharmacology and experimental therapeutics 2008
Naoe Okamura Stephen A Habay Joanne Zeng A Richard Chamberlin Rainer K Reinscheid

Neuropeptide S (NPS) has been shown to modulate arousal, sleep wakefulness, anxiety-like behavior, and feeding after central administration of the peptide agonist to mice or rats. We report here the chemical synthesis and pharmacological characterization of SHA 66 (3-oxo-1,1-diphenyl-tetrahydro-oxazolo[3,4-a]pyrazine-7-carboxylic acid benzylamide) and SHA 68 (3-oxo-1,1-diphenyl-tetrahydro-oxazo...

2009
Takanori Isobe Kyoji Shibutani

This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2. The proposed attack is based on meet-in-themiddle attacks. It seems difficult to find “independent words” of ...

Journal: :CIT 2013
Harshvardhan Tiwari Krishna Asawa

Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-0, SHA-1 and RIPEMD-160 are built on Merkle-Damgård iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions a...

Journal: :Scientific reports 2016
Burcu Baykal Minsky Christiane H Antoni Heike Boehm

Well-controlled grafting of small hyaluronan oligosaccharides (sHA) enables novel approaches to investigate biological processes such as angiogenesis, immune reactions and cancer metastasis. We develop two strategies for covalent attachment of sHA, a fast high-density adsorption and a two-layer system that allows tuning the density and mode of immobilization. We monitored the sHA adlayer format...

2011
A. S. Tambe

The conventional seminal parameters like sperm density, motility, morphology, etc. are not perfect indicators of seminal functional quality. Hence, Seminal Hyaluronidase Activity (SHA) and Hypo-osmotic Swelling (HOS score) of sperms that evaluate healthy sperms of fertilizing potential, were studied in male partners of infertile couples. The semen samples were obtained, by masturbation after 4 ...

ژورنال: پژوهش نفت 2016

هدف اصلی از این مطالعه بررسی توانایی سیانوباکتری ‏ Fischerella ambigua ISC67‎‏ در تجزیه زیستی نفت خام و اثر نفت خام بر پاسخ‌های فیزیولوژیک این سیانوباکتر می‌باشد. در این مطالعه تجربی، سیانوباکتری Fischerella ambiguaISC67 از کلکسیون ریز جلبک‌ها تهیه شد‏. نرخ رشد سیانوباکتری در آزمایه 1% نفت خام در طول موج nm 750 و مقدار کلروفیل در آزمایه های 5/0، 1، 2 و 4% نفت خام در طول موج nm 665 با استفاده از...

2005
Hirotaka Yoshida Alex Biryukov Bart Preneel

Biham and Chen proposed an attack on SHA-0 at Crypt 2004. In this paper, we apply the Biham-Chen attack to analyze SHAlike hash functions regarding pseudo-collision resistance and pseudorandomness. We present a scenario about how to attack SHA-like hash functions applying the Biham and Chen attack. Using this scenario, we present a differential attack on the MD5 hash function and a differential...

2015
Marc Stevens Pierre Karpman Thomas Peyrin

We present in this article a freestart collision example for SHA-1, i.e., a collision for its internal compression function. This is the first practical break of the full SHA-1, reaching all 80 out of 80 steps, while only 10 days of computation on a 64 GPU cluster were necessary to perform the attack. This work builds on a continuous series of cryptanalytic advancements on SHA-1 since the theor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید