نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

Journal: :Cognitive computation and systems 2022

With the international development of medical service informatisation, information sharing has become key standard to measure degree informatisation. In this process, it is important ensure security patients' such as records, examination reports, images and so on. article, an image encryption scheme based on Secure Hash Algorithm 3 (SHA-3), DNA coding high dimensional chaos system proposed prom...

Journal: :Neuron 2002
David Peretz R.Anthony Williamson Giuseppe Legname Yoichi Matsunaga Julie Vergara Dennis R. Burton Stephen J. DeArmond Stanley B. Prusiner Michael R. Scott

To investigate the role of the pathogenic prion protein (PrP(Sc)) in controlling susceptibility to foreign prions, two Syrian hamster (SHa) prion strains, Sc237 and DY, were transmitted to transgenic mice expressing chimeric SHa/mouse PrP genes, Tg(MH2M). First passage of SHa(Sc237) prions exhibited prolonged incubation times, diagnostic of a species barrier. PrP(Sc) of the new MH2M(Sc237) stra...

Journal: :Journal of clinical microbiology 1987
J L Watts W E Owens

A total of 353 coagulase-negative staphylococcus (CNS) isolates from infected bovine mammary glands were tested for cytolysin production by using the synergistic hemolysin assay (SHA). Overall, 34.6% of CNS isolates were SHA positive. Human-associated, coagulase-negative staphylococcal species contained the greatest number of SHA-positive strains. Milk leukocyte levels expressed as somatic cell...

Journal: :Des. Codes Cryptography 2010
Paulo S. L. M. Barreto Ventzislav Nikov Svetla Nikova Vincent Rijmen Elmar Tischhauser

A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided. In comparison to the algorithms submitted to the SHA-3 competiti...

2010
Luca Henzen Pietro Gendotti Patrice Guillet Enrico Pargaetzi Martin Zoller Frank K. Gürkaynak

The U.S. National Institute of Standards and Technology encouraged the publication of works that investigate and evaluate the performances of the second round SHA-3 candidates. Besides the hardware characterization of the 14 candidate algorithms, the main goal of this paper is the description of a reliable methodology to efficiently characterize and compare VLSI circuits of cryptographic primit...

Journal: :IACR Cryptology ePrint Archive 2013
Gautham Sekar Soumyadeep Bhattacharya

TCS SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard, compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible time and t...

2011
Ekawat Homsirikamol Marcin Rogawski Kris Gaj George Mason

In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current standard SHA-2 from the point of view of hardware performance in modern FPGAs. Each algorithm is implemented using multiple architectures based on the concepts of folding, unrolling, and pipelining. Trade-offs between speed and area are investigated, and the best architecture from the point of vi...

Journal: :IACR Cryptology ePrint Archive 2007
Danilo Gligoroski Svein J. Knapskog

In this paper we describe the construction of Turbo SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but the new hash function has three times more chaining variables, it is more robust and resistant against generic multi-block collision attacks, its design is resistant against generic length extension attacks and it is 2 8 times faster ...

Journal: :Journal of Cryptographic Engineering 2023

Abstract In sensitive communications, the cryptographic hash function plays a crucial role, including in military, healthcare, and banking, ensuring secure transmission by verifying data integrity carrying out other vital tasks. Compared to algorithms, such as SHA-1 SHA-2, Keccak (SHA-3) boasts superior hardware performance is more resilient modern cryptanalysis techniques. Nonetheless, enhance...

2014
Sheetal C. Deshmukh

Security has become a curial aspect in the design and use of computer system and network. Hash functions are used for many applications in cryptography mainly in digital signatures and message authentication code and in network security. Keccak hash function has been submitted to SHA-3 competition. In this paper has implement “SHA-3 512 bit” hash function and high throughput cone designed to wo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید