نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

Journal: :فصلنامه علمی پژوهشی تاریخ اسلام 0
محمد علی رنجبر عضو هیئت علمی گروه تاریخ دانشگاه یزد

member of the teaching staff in yazd university. the musha'sha'ids'uprising in south region of mesopotamia and khoozestan was performed under the sayyid mohammad b.falah's leadership (died in 870 a.h.) and then shiite's centeral government under the centerality of hoveizeh was established. until now, we don,t have considerable works about sayyid mohammad b.falah's ...

Journal: :IACR Cryptology ePrint Archive 2015
Christoph Dobraunig Maria Eichlseder Florian Mendel

In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit platforms, while maintaining the same hash size and claimed security level. So far, no third-party analysis of SHA-512/224 or SHA-512/256 has been published. In this work, we examine the collision resistance of step-redu...

2014
Hongbo Yu Dongxia Bai

SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack. Boomerang distinguisher on SHA-512 compression function reduced to 48 steps is proposed, with a practical complexity of 2. A prac...

در سال‌های اخیر بررسی امنیت سومین تابع چکیده‌ساز امن[1] یکی از مهم‌ترین موضوعات مورد توجه پژوهش­گران حوزه رمزنگاری بوده ‌است. توابع چکیده‌ساز در رمزنگاری کاربردهای متعددی دارند. از این­رو امنیت توابع چکیده‌ساز در مقابل حملات مختلف برای سامانه‌هایی که از آن استفاده می‌کنند، بسیار مهم است. حملات و تحلیل‌های متعددی تا امروز بر روی SHA-3 اعمال شده ‌است؛ اما تاکنون هیچ­کدام موفق به شکستن آن به‌صورت ...

Journal: :IACR Cryptology ePrint Archive 2008
Somitra Kumar Sanadhya Palash Sarkar

In this work, we provide new and improved attacks against 22, 23 and 24-step SHA-2 family using a local collision given by Sanadhya and Sarkar (SS) at ACISP ’08. The success probability of our 22-step attack is 1 for both SHA-256 and SHA-512. The computational efforts for the 23-step and 24step SHA-256 attacks are respectively 2 and 2 calls to the corresponding step reduced SHA-256. The corresp...

2016
Sourabh Kulkarni

Implementing hash functions to run on multi-core computers will reduce its running time. We aim to implement Cayley, SHA-256 and SHA-512 hash functions to run on multicore computers and compare their performances. Cayley hash compresses the input message by hashing one bit at a time using composition of linear equations. SHA-256 and SHA-512 work on message blocks and produce fixed length digest...

Journal: :J. Inf. Sci. Eng. 2013
Chu-Hsing Lin Chen-Yu Lee Krishna M. Kavi Deng-Jyi Chen Yi-Shiung Yeh

One-way hash functions play an important role in modern cryptography. Matusiewicz et al. proved that the message scheduling is essential for the security of SHA256 by showing that it is possible to find collisions with complexity 2 hash operations for a variant without it. In this article, we first proposed the conjecture that message scheduling of SHA algorithm has higher security complexity (...

در این تحقیق تاثیر پیش تیمار ترکیبی زمان (24 و 96 ساعت) و pH (7 و 9) در شرایط محدودیت افراطی دی اکسید کربن (عدم هوادهی، عدم تلقیح دی اکسید کربن)، بر فاز تصاعدی رشد، محتوای رنگیزه ای به ازای سلول، جابجایی جذب کلروفیل، ساختار و عملکرد فیکوبیلی زوم، نسبت رنگیزه‌‌های مرکز واکنش و کمپلکس‌‌های جمع آوری کننده نور؛ و نسبت فتوسیستم یک به دو در سیانوباکتری استیگونماتال Fischerella sp.FS 18 بررسی...

Journal: :IACR Cryptology ePrint Archive 2008
Vlastimil Klíma

In this paper we don't examine security of Turbo SHA-2 completely; we only show new collision attacks on it, with smaller complexity than it was considered by Turbo SHA-2 authors. In [1] they consider Turbo SHA-224/256r and Turbo SHA-384/512-r with variable number of rounds r from 1 to 8. The authors of [1] show collision attack on Turbo SHA-256-1 with one round which has the complexity of 2. F...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید