نتایج جستجو برای: 512 33 kg

تعداد نتایج: 314540  

Journal: :Antimicrobial agents and chemotherapy 2004
Lorna E T Stearne Doret van Boxtel Nicole Lemmens Wil H F Goessens Johan W Mouton Inge C Gyssens

The effects of ceftizoxime (CZX), piperacillin (PIP), and PIP-tazobactam (PT) concentrations on the antibacterial activity and selection of resistant mutants of Bacteroides fragilis and Enterobacter cloacae were investigated in vitro in a mixed-culture anaerobic time-kill study and in vivo in a mixed-infection abscess model. Mixed cultures were incubated for 24 h with 0.125 to 512 micro g of CZ...

Journal: :Canadian Journal of Plant Science 1990

Journal: :Nature 1996

Journal: :Canadian Journal of Plant Science 1993

Journal: :Toxicology in vitro : an international journal published in association with BIBRA 2008
James R Komorowski Danielle Greenberg Vijaya Juturu

Chromium picolinate (CrPic) is used as a dietary supplement and has beneficial effects in reducing diabetes risk factors. The present study evaluated the cytogenetic effects of CrPic in bone marrow cells of Sprague-Dawley rats (5 animals/sex/group). Test animals were dosed orally with 33, 250 or 2000 mg/kg of CrPic, which corresponded to doses of 4.1, 30.8 and 246 mg/kg of chromium. The lowest ...

2016
Kyle P. Quinn Ermelindo C. Leal Ana Tellechea Antonios Kafanas Michael E. Auster Aristidis Veves Irene Georgakoudi

Animal model All animal studies were conducted in accordance with NIH guidelines and approved Beth Israel Deaconess Medical Center (BIDMC) Institutional Animal Care and Use Committee IACUC protocol #072-2012. Diabetes was induced in C57BL/6J mice with low doses of streptozotocin (STZ, 50 mg/kg, intraperitoneally) administered for 5 consecutive days, 8 weeks prior to wound healing experiments. H...

Journal: :IACR Cryptology ePrint Archive 2009
Yu Sasaki

In this note, we present a 2nd-preimage attack on AURORA512, which is one of the candidates for SHA-3. Our attack can generate 2nd-preimages of any given message, in particular, the attack complexity becomes optimal when the message length is 9 blocks or more. In such a case, the attack complexity is approximately 2 AURORA-512 operations, which is less than the brute force attack on AURORA-512,...

2001
F. Tecchio A. Oliviero P. Pasqualetti D. Lupoi A. Orlacchio V. Pizzella P. M. Rossini

F. Tecchio, A. Oliviero, P. Pasqualetti, D. Lupoi, 4 A. Orlacchio, V. Pizzella, and P.M. Rossini Ospedale “Fatebenefratelli” , Dipartimento di Neuroscienze, Isola Tiberina, Rome, Italy; Istituto di Elettronica dello Stato Solido, CNR, Rome, Italy; AfaR CRCCS Rome, Italy; Ospedale “Fatebenefratelli” , Dipartimento di Radiologia, Rome, Italy; Dip. Scienze cliniche e bioimmagini, & ITAB, Universit...

2014
Hongbo Yu Dongxia Bai

SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack. Boomerang distinguisher on SHA-512 compression function reduced to 48 steps is proposed, with a practical complexity of 2. A prac...

Journal: :IACR Cryptology ePrint Archive 2009
Yu Sasaki

In this note, we present a full key recovery attack on HMACAURORA-512 when 512-bit secret keys are used and the MAC length is 512-bit long. Our attack requires 2 queries and the off-line complexity is 2 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search for a 512-bit key. The attack can be carried out with a negligible amount of memory. Our attack ca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید