نتایج جستجو برای: sha 3
تعداد نتایج: 1812667 فیلتر نتایج به سال:
With the international development of medical service informatisation, information sharing has become key standard to measure degree informatisation. In this process, it is important ensure security patients' such as records, examination reports, images and so on. article, an image encryption scheme based on Secure Hash Algorithm 3 (SHA-3), DNA coding high dimensional chaos system proposed prom...
To investigate the role of the pathogenic prion protein (PrP(Sc)) in controlling susceptibility to foreign prions, two Syrian hamster (SHa) prion strains, Sc237 and DY, were transmitted to transgenic mice expressing chimeric SHa/mouse PrP genes, Tg(MH2M). First passage of SHa(Sc237) prions exhibited prolonged incubation times, diagnostic of a species barrier. PrP(Sc) of the new MH2M(Sc237) stra...
A total of 353 coagulase-negative staphylococcus (CNS) isolates from infected bovine mammary glands were tested for cytolysin production by using the synergistic hemolysin assay (SHA). Overall, 34.6% of CNS isolates were SHA positive. Human-associated, coagulase-negative staphylococcal species contained the greatest number of SHA-positive strains. Milk leukocyte levels expressed as somatic cell...
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided. In comparison to the algorithms submitted to the SHA-3 competiti...
The U.S. National Institute of Standards and Technology encouraged the publication of works that investigate and evaluate the performances of the second round SHA-3 candidates. Besides the hardware characterization of the 14 candidate algorithms, the main goal of this paper is the description of a reliable methodology to efficiently characterize and compare VLSI circuits of cryptographic primit...
TCS SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard, compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible time and t...
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current standard SHA-2 from the point of view of hardware performance in modern FPGAs. Each algorithm is implemented using multiple architectures based on the concepts of folding, unrolling, and pipelining. Trade-offs between speed and area are investigated, and the best architecture from the point of vi...
In this paper we describe the construction of Turbo SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but the new hash function has three times more chaining variables, it is more robust and resistant against generic multi-block collision attacks, its design is resistant against generic length extension attacks and it is 2 8 times faster ...
Abstract In sensitive communications, the cryptographic hash function plays a crucial role, including in military, healthcare, and banking, ensuring secure transmission by verifying data integrity carrying out other vital tasks. Compared to algorithms, such as SHA-1 SHA-2, Keccak (SHA-3) boasts superior hardware performance is more resilient modern cryptanalysis techniques. Nonetheless, enhance...
Security has become a curial aspect in the design and use of computer system and network. Hash functions are used for many applications in cryptography mainly in digital signatures and message authentication code and in network security. Keccak hash function has been submitted to SHA-3 competition. In this paper has implement “SHA-3 512 bit” hash function and high throughput cone designed to wo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید