نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

Journal: :IACR Cryptology ePrint Archive 2009
Stefan Tillich Martin Feldhofer Wolfgang Issovits Thomas Kern Hermann Kureck Michael Mühlberghuber Georg Neubauer Andreas Reiter Armin Köfler Mathias Mayrhofer

The weakening of the widely used SHA-1 hash function has also cast doubts on the strength of the related algorithms of the SHA-2 family. The US NIST has therefore initiated the SHA-3 competition in order to select a modern hash function algorithm as a “backup” for SHA-2. This algorithm should be efficiently implementable both in software and hardware under different constraints. In this paper, ...

2011
Peter Schwabe Bo-Yin Yang Shang-Yi Yang

This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. We report new speed records for all of the six implemented functions. For example our implementation of the round-3 version of JH-256 is 35% faster than the fastest implementation of the round-2 version of JH-256 in eBASH. Scaled w...

2009
Praveen Gauravaram Lars R. Knudsen Krystian Matusiewicz Florian Mendel Christian Rechberger Martin Schläffer Søren S. Thomsen

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about th...

Journal: :CoRR 2008
Somitra Kumar Sanadhya Palash Sarkar

Recently, Indesteege et al. [1] had described attacks against 23 and 24-step SHA-512 at SAC ’08. Their attacks are based on the differential path by Nikolić and Biryukov [2]. The reported complexities are 2 and 2 calls to the respective step reduced SHA-512 hash function. They provided colliding message pairs for 23-step SHA-512 but did not provide a colliding message pair for 24-step SHA-512. ...

2012
Elena Andreeva Bart Mennink Bart Preneel Marjan Skrobot

In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to the vulnerabilities identified in widely employed hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. At present, 5 candidates are left in the third round of the competition. An import...

2017
Andre R. Jordan Soum D. Lokeshwar Luis E. Lopez Martin Hennig Juan Chipollini Travis Yates Marie C. Hupe Axel S. Merseburger Aviva Shiedlin Wolfgang H. Cerwinka Kebin Liu Vinata B. Lokeshwar

Tumor cell-derived hyaluronidase HYAL-1 degrades hyaluronic acid (HA) into angiogenic fragments (AGF: 10-12 disaccharides). AGF support tumor growth and progression. Urine and tissue HAase/HYAL-1 levels are sensitive markers for high-grade bladder cancer (BCa) and its metastasis. In preclinical models of BCa, we evaluated whether o-sulfated AGF (sHA-F) inhibits HAase activity and has antitumor ...

Journal: :Journal of sport rehabilitation 2013
Ji-hyun Lee Heon-seock Cynn Sil-ah Choi Tae-lim Yoon Hyo-jung Jeong

CONTEXT Gluteus medius (Gmed) weakness is associated with some lower-extremity injuries. People with Gmed weakness might compensate by activating the tensor fasciae latae (TFL). Different hip rotations in the transverse plane may affect Gmed and TFL muscle activity during isometric side-lying hip abduction (SHA). OBJECTIVES To compare Gmed and TFL muscle activity and the Gmed:TFL muscle-activ...

Journal: :Annales UMCS, Informatica 2012
Mateusz Buczek

StreamHash 2 is a hash function proposed by Michał Trojnara at the Cryptography and Security Systems in 2011 Conference. This algorithm is a member of StreamHash family which was first introduced in 2008 during the SHA-3 Competition. In this paper we will show collision attacks on the internal state of the StreamHash 2 hash function with complexity about 2 for the 32n-bit version of the algorit...

2011
Ryan Toukatly

A global competition is currently taking place to select a hash function which will become a new standard in the field of cryptography. The competition was announced in 2007 by the National Institute of Standards and Technology (NIST) to find a successor to its previous Secure Hash Algorithm (SHA) standards, SHA-1 and SHA-2. The submissions have been narrowed down to a set of five, judged by th...

2013
Mohammad A. AlAhmad Imad Fakhri Alshaikhli

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applic...

20042005200620072008200920102011201220132014201520162017201820192020202120222023050000100000150000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید