نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

2015
Raaed K. Ibrahim Ali SH. Hussain Roula A. Kadhim

This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from ente...

2016
Vikas Dhawan Gurjot Singh Gaba

Security of precious data is the most critical design parameter of a communication network. Applications like online banking and military information exchange requires more concern over security regardless of other design issues like power and energy consumption. Data alterations in some applications can lead to severe irreparable losses. This paper presents a novel and reliable Hash algorithm ...

2005
H. E. MICHAIL A. P. KAKAROUNTAS C. E. GOUTIS

The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to m...

2011
Wander G. Botero Luciana C. de Oliveira Bruno B. Cunha Lílian K. de Oliveira Danielle Goveia Julio Cesar Rocha André Henrique Rosa

Interações entre substâncias húmicas aquáticas (SHA), de rios tropicais, e dois interferentes endócrinos (IE) foram estudados utilizando sistema de ultrafiltração em fluxo tangencial equipado com membrana de celulose de 1 kDa com a finalidade de separar os IE livres da fração ligada as SHA. A quantificação de 17a-etinilestradiol e bisfenol A foi realizada utilizando cromatógrafo a gás acoplado ...

2006

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The United States of America has adopted a suite of Secure Hash Algorithms (SHAs), including four beyond SHA-1, as part of a Federal Information Processing Standard (FIPS), specifically SHA-224 (RFC 3874), SHA-256, ...

Journal: :IACR Cryptology ePrint Archive 2009
Kazumaro Aoki Jian Guo Krystian Matusiewicz Yu Sasaki Lei Wang

In this paper, we present preimage attacks on up to 43step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly increases the number of attacked steps compared to the best previously published preimage attack working for 24 steps. The time complexities are 2, 2 for finding pseudo-preimages and 2, 2 compression function operatio...

2008
Sebastiaan Indesteege Florian Mendel Bart Preneel Christian Rechberger

We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision attacks on SHA-256 reduced to 23 and 24 steps with complexities 2 and 2, respectively. We give example colliding message pairs for 23-step and 24-step SHA-256. The best previous, recently obtained result was a collision attack for up to 22 steps. We extend our attacks to 23 and 24-step reduced SH...

2012
Piyush Garg Namita Tiwari

To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified securit...

2010
Sebastiaan Indesteege

In this talk, we review the successful cryptanalysis of two cryptographic hash functions, EnRUPT and SHAMATA. Both were submitted as candidates to the NIST SHA-3 competition.

Journal: :Psychiatric services 2010
Steven P Segal Carol J Silverman Tanya L Temkin

OBJECTIVE Self-help agencies (SHAs) are consumer-operated service organizations managed as participatory democracies. Members are involved in all aspects of organizational management, because a premise of SHAs is that organizationally empowered individuals become more empowered in their own lives, which promotes recovery. The study sought to determine the effectiveness of combined SHA and commu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید