نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

Journal: :Malaysian Journal of Computer Science 2022

With the rapid advancement of technologies and proliferation intelligent devices, connecting to internet challenges have grown manifold, such as ensuring communication security keeping user credentials secret. Data integrity privacy become crucial concerns in any ecosystem advanced interconnected communications. Cryptographic hash functions been extensively employed ensure data insecure environ...

احمدی اسبچین, سلمان, سلطانی, ندا, صفری, معین, کمالی, مریم,

Background and purpose: Cyanobacteria are rich sources of secondary metabolites. Antibiotic resistant pathogens are rising and people are more interested in using natural products these days. Hence, identifying competent cyanobacteria for the extraction of antimicrobial compounds is of great benefit. The main objective of this study was to investigate the in vitro antibacterial activity of ...

2012
Rama Krishna Prasad

Secure Hash Algorithms are one of the forms of cryptographic algorithms. SHA hash functions are widely used security constructs. However, they are software implementations of SHA. This paper proposes techniques for hardware implementation of SHA. In order to provide security and improve performance, these methods are used in hardware reutilization and operation rescheduling. The purpose of impl...

2013
Zhiyou Fu Fengchang Wu Kang Song Ying Lin Yingchen Bai Yuanrong Zhu John P. Giesy

In order to better understand the influence and mechanism of soil-derived humic acid (SHA) on adsorption of P onto particles in soils, the amounts of PO4 adsorbed by synthetic goethite (a-FeOOH) were determined at different concentrations of SHA, pH, ionic strength and order of addition of adsorbents. Addition of SHA can significantly reduce the amount of PO4 adsorption as much as 27.8%. Both g...

Journal: :The European journal of neuroscience 2006
Hua Zhang Yu Fu Christophe Altier Josef Platzer D James Surmeier Ilya Bezprozvanny

Neurons express multiple types of voltage-gated calcium (Ca2+) channels. Two subtypes of neuronal L-type Ca2+ channels are encoded by CaV1.2 and CaV1.3 pore-forming subunits. To compare targeting of CaV1.2 and CaV1.3 L-type Ca2+ channels, we transfected rat hippocampal neuronal cultures with surface-epitope-tagged sHA-CaV1.2 or sHA-CaV1.3a constructs and found that: (i) both sHA-CaV1.2 and sHA-...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده برق و کامپیوتر 1392

چکیده امروزه رمزنگاری یکی از ابزارهای مهم برای اطمینان از ارسال امن داده در پست الکترونیک، بانکداری الکترونیک و دیگر ارتباطات حساس دیجیتالی است. یکی از ابزارهای مفید و مهم در مسایل اعتباری و رمزنگاری، استفاده از توابع درهم ساز است. در راستای کاربرد وسیع توابع رمزنگاری، نیاز به پیاده سازی با حجم مصرفی کم برای این توابع افزایش پیداکرده است. با توجه به نقاط ضعفی که در توابع درهم ساز sha-1 و نگرا...

2003
JEFFREY L. WATTS

A total of 353 coagulase-negative staphylococcus (CNS) isolates from infected bovine mammary glands were tested for cytolysin production by using the synergistic hemolysin assay (SHA). Overall, 34.6% of CNS isolates were SHA positive. Human-associated, coagulase-negative staphylococcal species contained the greatest number of SHA-positive strains. Milk leukocyte levels expressed as somatic cell...

Journal: :IEICE Transactions 2005
Mitsuhiro Hattori Shoichi Hirose Susumu Yoshida

The security of SHA-0 with various message schedules is discussed in this letter. SHA-0 employs a primitive polynomial of degree 16 over GF(2) in its message schedule. For each primitive polynomial, a SHA-0 variant can be constructed. The collision resistance and the near-collision resistance of SHA-0 variants to the Chabaud-Joux attack are evaluated. Moreover, the near-collision resistance of ...

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

Journal: :IACR Cryptology ePrint Archive 2008
Somitra Kumar Sanadhya Palash Sarkar

Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version of SHA-2 hash functions. Recently, at FSE ’08, an attack against reduced round SHA-256 was presented by Nikolić and Biryukov which used a local collision which is valid for the actual SHA-256 function. It is a 9-step local collision which starts by introducing a mod...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید