نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

Journal: :CoRR 2008
Somitra Kumar Sanadhya Palash Sarkar

In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ایلام - دانشکده علوم پایه 1392

سیانوباکتری‎ ‎ها قدیمی‎ ‎ترین پروکاریوت‎ ‎های فتوسنتز‎ ‎کننده روی زمین می‎ ‎باشند. این میکروارگانیسم ها در سال های ‏اخیر به دلیل پتانسیل استفاده در بیوتکنولوژی و به عنوان منبعی از ترکیبات ضدمیکروبی مورد توجه قرارگرفته‎ ‎اند. ‏نفت خام و اجزای تشکیل دهنده آن یکی از مهمترین آلاینده های آلی محیط زیست اند که وجود آنها در طبیعت ‏نگران کننده است. روش های‎ ‎مختلفی‎ ‎برای‎ ‎پاکسازی‎ ‎آلودگی های‎ ‎نفتی‎ ...

Journal: :Molecular pharmacology 2009
David Hermanson Sadiya N Addo Anna A Bajer Jonathan S Marchant Sonia Goutam Kumar Das Balasubramanian Srinivasan Fawaz Al-Mousa Francesco Michelangeli David D Thomas Tucker W Lebien Chengguo Xing

HA 14-1 is a small-molecule Bcl-2 antagonist that promotes apoptosis in malignant cells, but its mechanism of action is not well defined. We recently reported that HA 14-1 has a half-life of only 15 min in vitro, which led us to develop a stable analog of HA 14-1 (sHA 14-1). The current study characterizes its mode of action. Because of the antiapoptotic function of Bcl-2 family proteins on the...

2013
Haruka Kaneko Muneaki Ishijima Tokuhide Doi Ippei Futami Lizu Liu Ryo Sadatsuki Anwarjan Yusup Shinnosuke Hada Mitsuaki Kubota Takayuki Kawasaki Yoshitomo Saita Yuji Takazawa Hiroshi Ikeda Hisashi Kurosawa Kazuo Kaneko

BACKGROUND While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation. The aim of this study was to establish the reference intervals of sHA corresponding to the radiographic severity of knee OA for elucidating whether...

Journal: :international journal of environmental research 0
j.h. kim department of biological science, college of bioscience and biotechnology, chungnam national university, daejeon 305-764, south korea h.m. oh environmental biotechnology research center, korea research institute of bioscience & biotechnology, daejeon 305-806, south korea i.s. kim institute of environmentally-friendly agriculture, college of agriculture and life sciences, chonnam national university, gwangju 500-757, south korea b.j. lim yeongsan river water research center, gwangju 500-480, south korea k.g. an department of biological science, college of bioscience and biotechnology, chungnam national university, daejeon 305-764, south korea

the objective of this study was to diagnose integrative ecological health of an urban stream,which is located in the asian temperate region. the research approach was primarily based on the index ofbiological integrity (ibi) using fish assemblage and a qualitative habitat evaluation index (qhei). and these indexes were compared with long-term conventional chemical dataset during 1996-2005. for ...

Journal: :Transactions of the Architectural Institute of Japan 1983

2015

Data security is vital to the world we live in, and the foundation that secure communication is built upon is cryptography. Cryptography is a course that is regularly offered at colleges and universities. In our experience, computer science students find that understanding the sophisticated mathematics behind the crypto-systems is a daunting task, while math majors often get lost in the details...

2003
Nicolas Sklavos Odysseas G. Koufopavlou

Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new encryption algorithms are designed, in order to satisfy the special needs for security. SHA-2 is the newest powerful standard in the hash functions families. In this paper, a VLSI architecture for the SHA-2 family is pro...

2010
Kris Gaj Ekawat Homsirikamol Marcin Rogawski

In this paper, we extend our evaluation of the hardware performance of 14 Round 2 SHA-3 candidates, presented at CHES 2010, to the case of high security variants, with 512 bit outputs. A straightforward method for predicting the performance of 512-bit variants, based on the results for 256-bit versions of investigated hash functions is presented, and confirmed experimentally. The VHDL codes for...

Journal: :CoRR 2009
Dhananjoy Dey Prasanna Raghaw Mishra Indranath Sen Gupta

Vulnerability of dedicated hash functions to various attacks has made the task of designing hash function much more challenging. This provides us a strong motivation to design a new cryptographic hash function viz. HF-hash. This is a hash function, whose compression function is designed by using first 32 polynomials of HFE Challenge-1 [8] with 64 variables by forcing remaining 16 variables as z...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید