نتایج جستجو برای: fischerella sp sha
تعداد نتایج: 122273 فیلتر نتایج به سال:
With the rapid advancement of technologies and proliferation intelligent devices, connecting to internet challenges have grown manifold, such as ensuring communication security keeping user credentials secret. Data integrity privacy become crucial concerns in any ecosystem advanced interconnected communications. Cryptographic hash functions been extensively employed ensure data insecure environ...
Background and purpose: Cyanobacteria are rich sources of secondary metabolites. Antibiotic resistant pathogens are rising and people are more interested in using natural products these days. Hence, identifying competent cyanobacteria for the extraction of antimicrobial compounds is of great benefit. The main objective of this study was to investigate the in vitro antibacterial activity of ...
Secure Hash Algorithms are one of the forms of cryptographic algorithms. SHA hash functions are widely used security constructs. However, they are software implementations of SHA. This paper proposes techniques for hardware implementation of SHA. In order to provide security and improve performance, these methods are used in hardware reutilization and operation rescheduling. The purpose of impl...
In order to better understand the influence and mechanism of soil-derived humic acid (SHA) on adsorption of P onto particles in soils, the amounts of PO4 adsorbed by synthetic goethite (a-FeOOH) were determined at different concentrations of SHA, pH, ionic strength and order of addition of adsorbents. Addition of SHA can significantly reduce the amount of PO4 adsorption as much as 27.8%. Both g...
Neurons express multiple types of voltage-gated calcium (Ca2+) channels. Two subtypes of neuronal L-type Ca2+ channels are encoded by CaV1.2 and CaV1.3 pore-forming subunits. To compare targeting of CaV1.2 and CaV1.3 L-type Ca2+ channels, we transfected rat hippocampal neuronal cultures with surface-epitope-tagged sHA-CaV1.2 or sHA-CaV1.3a constructs and found that: (i) both sHA-CaV1.2 and sHA-...
چکیده امروزه رمزنگاری یکی از ابزارهای مهم برای اطمینان از ارسال امن داده در پست الکترونیک، بانکداری الکترونیک و دیگر ارتباطات حساس دیجیتالی است. یکی از ابزارهای مفید و مهم در مسایل اعتباری و رمزنگاری، استفاده از توابع درهم ساز است. در راستای کاربرد وسیع توابع رمزنگاری، نیاز به پیاده سازی با حجم مصرفی کم برای این توابع افزایش پیداکرده است. با توجه به نقاط ضعفی که در توابع درهم ساز sha-1 و نگرا...
A total of 353 coagulase-negative staphylococcus (CNS) isolates from infected bovine mammary glands were tested for cytolysin production by using the synergistic hemolysin assay (SHA). Overall, 34.6% of CNS isolates were SHA positive. Human-associated, coagulase-negative staphylococcal species contained the greatest number of SHA-positive strains. Milk leukocyte levels expressed as somatic cell...
The security of SHA-0 with various message schedules is discussed in this letter. SHA-0 employs a primitive polynomial of degree 16 over GF(2) in its message schedule. For each primitive polynomial, a SHA-0 variant can be constructed. The collision resistance and the near-collision resistance of SHA-0 variants to the Chabaud-Joux attack are evaluated. Moreover, the near-collision resistance of ...
In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...
Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version of SHA-2 hash functions. Recently, at FSE ’08, an attack against reduced round SHA-256 was presented by Nikolić and Biryukov which used a local collision which is valid for the actual SHA-256 function. It is a 9-step local collision which starts by introducing a mod...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید