نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

2003
GEORGE HAJISHENGALLIS ELENA NIKOLOVA

The effect of human secretory immunoglobulin A (S-IgA) and serum antibodies to surface protein antigen (Ag) 1I/ on the adherence of Ag VII-bearing Streptococcus mutans and of free Ag VII to saliva-coated hydroxyapatite (SHA) was investigated. The inhibition by S-IgA of binding of both S. mutans and free Ag IJI to SHA was dependent on antibody to Ag VII. Essentially no difference was found betwe...

Journal: :Journal of tissue engineering and regenerative medicine 2012
C Isikli V Hasirci N Hasirci

Composite scaffolds prepared from natural polymers and hydroxyapatite (HA) are expected to have enhanced osteoconductive properties and as a result gained much attention in recent years for use in bone tissue-engineering applications. Although there are various natural polymers available for this purpose, chitosan (C) and gelatin (G) are commonly studied because of their inherent properties. Th...

2003

Hash functions are among the most widespread cryptographic primitives, and are currently used in multiple cryptographic schemes and security protocols, such as IPSec and SSL. In this paper, we investigate a new hardware architecture for a family of dedicated hash functions, including American standards, SHA-1 and SHA-512. Our architecture is based on unrolling several message digest steps and e...

2013
Marc Stevens

The main contributions of this paper are two-fold. Firstly, we present a novel direction in the cryptanalysis of the cryptographic hash function SHA-1. Our work builds on previous cryptanalytic efforts on SHA-1 based on combinations of local collisions. Due to dependencies, previous approaches used heuristic corrections when combining the success probabilities and message conditions of the indi...

Journal: :Genetics 2006
Nan Ren Biao He David Stone Sreenatha Kirakodu Paul N Adler

The simple cellular composition and array of distally pointing hairs has made the Drosophila wing a favored system for studying planar polarity and the coordination of cellular- and tissue-level morphogenesis. The developing hairs are filled with F-actin and microtubules and the activity of these cytoskeletons is important for hair morphogenesis. On the basis of mutant phenotypes several genes ...

2016
Tingting Chen Ninghua Liu Jinxuan Liu Xiaoying Zhang Zhen Huang Yuhui Zang Jiangning Chen Lei Dong Junfeng Zhang Zhi Ding

OBJECTIVE The skin is an important immunological barrier of the body as well as an optimal route for vaccine administration. Gua Sha, which involves press-stroke treatment of the skin, is an effective folk therapy, widely accepted in East Asia, for various symptoms; however, the mechanisms underlying its therapeutic effects have not been clarified. We investigated the influence of Gua Sha on th...

Journal: :IACR Cryptology ePrint Archive 2008
Somitra Kumar Sanadhya Palash Sarkar

The SHA-256 hash function has started getting attention recently by the cryptanalysis community due to the various weaknesses found in its predecessors such as MD4, MD5, SHA-0 and SHA-1. We make two contributions in this work. First we describe message modification techniques and use them to obtain an algorithm to generate message pairs which collide for the actual SHA-256 reduced to 18 steps. ...

2013
Yanping Wang Li Yang Zhimin Zheng Rebecca Grumet Wayne Loescher Jian-Kang Zhu Pingfang Yang Yuanlei Hu Zhulong Chan

Salt stress is one of the major abiotic stresses in agriculture worldwide. Analysis of natural genetic variation in Arabidopsis is an effective approach to characterize candidate salt responsive genes. Differences in salt tolerance of three Arabidopsis ecotypes were compared in this study based on their responses to salt treatments at two developmental stages: seed germination and later growth....

Journal: :J. Information Security 2012
Yaser Jararweh Lo'ai Ali Tawalbeh Hala Tawalbeh Abidalrahman Mohammad

Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions. In this paper, we present a comprehensive hardware evaluation for the final round SHA-3 candidates...

2005
Xiaoyun Wang Hongbo Yu Yiqun Lisa Yin

In this paper, we present new techniques for collision search in the hash function SHA-0. Using the new techniques, we can find collisions of the full 80-step SHA-0 with complexity less than 2 hash operations.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید