نتایج جستجو برای: mutamid 256

تعداد نتایج: 12691  

1998
Freya L. Sonenstein Laura D. Lindberg Carolyn H. Bradner Scott Boggess Joseph H. Pleck

Methods: Data on the sexual behavior, sexual attitudes, educational experiences and demographics of 2,087 never-married metropolitan males aged 17–19 from the 1979 National Survey of Young Men and the 1988 and 1995 waves of the National Survey of Adolescent Males were analyzed through multivariate methods to examine factors that predict sexual behavior as well as those that predict sexual attit...

2002
Jay R. Harris Frances O’Malley Stuart J. Schnitt S. Eva Singletary Monica Morrow Eric A. Strom Lawrence W. Bassett D. David Dershaw Barbara Fowble

The multidisciplinary guidelines for management of ductal carcinoma in situ of the breast from the American College of Radiology, the American College of Surgeons, the College of American Pathology, and the Society of Surgical Oncology have been updated to take into account continuing advances in the diagnosis and treatment of this disease. The continued growth in mammographic evaluation and te...

Journal: :JIPS 2012
Siddharth Agarwal Abhinav Rungta R. Padmavathy Mayank Shankar Nipun Rajan

Recently, a fast and secure hash function SFHA – 256 has been proposed and claimed as more secure and as having a better performance than the SHA – 256. In this paper an improved version of SFHA – 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis ensures the performance of the newly proposed and im...

Journal: :J. Inf. Sci. Eng. 2011
Jinmin Zhong Xuejia Lai

DHA-256 (Double Hash Algorithm) was proposed at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 is a dedicated hash function with output length of 256 bits and 64 steps of operations designed to enhance SHA-256 security. In this paper, we show an attack on 35-step DHA-256. The attack finds pseudo-preimage and preimage of 35-step DHA-256 with the time complexity of 2 and...

Journal: :IACR Cryptology ePrint Archive 2008
Somitra Kumar Sanadhya Palash Sarkar

The SHA-256 hash function has started getting attention recently by the cryptanalysis community due to the various weaknesses found in its predecessors such as MD4, MD5, SHA-0 and SHA-1. We make two contributions in this work. First we describe message modification techniques and use them to obtain an algorithm to generate message pairs which collide for the actual SHA-256 reduced to 18 steps. ...

2007
Florian Mendel Joseph Lano Bart Preneel

FORK-256 is a hash function presented at FSE 2006.Whereas SHA-like designs process messages in one stream, FORK-256 uses four parallel streams for hashing. In this article, we present the first cryptanalytic results on this design strategy. First, we study a linearized variant of FORK-256, and show several unusual properties of this linearized variant. We also explain why the linearized model c...

2008
Ivica Nikolic Alex Biryukov

In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the equations that arise from the conditions. Due to the carefully chosen differential and word differences, the message expansion of SHA-256 has little effect on spreading the differences in the words. This helps us to fin...

Journal: :IACR Cryptology ePrint Archive 2009
Jinmin Zhong Xuejia Lai

DHA-256 (Double Hash Algorithm) was proposed at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 is a dedicated hash function with output length of 256 bits and 64 steps of operations designed to enhance SHA-256 security. In this paper, we show two attacks on reduced DHA-256. The first attack finds one-block second preimage and preimage of 26-step DHA-256 with time compl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید