نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

2004

A 224-bit One-way Hash Function: SHA-224 Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies a 224-bit one-way hash function, called SHA-224. SHA-224 is based on SHA-256, but it uses a different initial value and the result is truncated to 224...

2015
Raaed K. Ibrahim Ali SH. Hussain Roula A. Kadhim

This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from ente...

2016
Vikas Dhawan Gurjot Singh Gaba

Security of precious data is the most critical design parameter of a communication network. Applications like online banking and military information exchange requires more concern over security regardless of other design issues like power and energy consumption. Data alterations in some applications can lead to severe irreparable losses. This paper presents a novel and reliable Hash algorithm ...

2005
H. E. MICHAIL A. P. KAKAROUNTAS C. E. GOUTIS

The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to m...

2010
Xu Guo Sinan Huang Leyla Nazhandali Patrick Schaumont

Hardware implementation quality will be considered as an important factor for evaluating the NIST SHA-3 competition candidates in the second round. The most traditional and popular hardware im­ plementation method is designing ASICs with standard cells. However, to benchmark 14 second round SHA-3 ASIC designs based on a fair and comprehensive methodology can be very challenging because of the u...

2011
Wander G. Botero Luciana C. de Oliveira Bruno B. Cunha Lílian K. de Oliveira Danielle Goveia Julio Cesar Rocha André Henrique Rosa

Interações entre substâncias húmicas aquáticas (SHA), de rios tropicais, e dois interferentes endócrinos (IE) foram estudados utilizando sistema de ultrafiltração em fluxo tangencial equipado com membrana de celulose de 1 kDa com a finalidade de separar os IE livres da fração ligada as SHA. A quantificação de 17a-etinilestradiol e bisfenol A foi realizada utilizando cromatógrafo a gás acoplado ...

2006

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The United States of America has adopted a suite of Secure Hash Algorithms (SHAs), including four beyond SHA-1, as part of a Federal Information Processing Standard (FIPS), specifically SHA-224 (RFC 3874), SHA-256, ...

Journal: :IACR Cryptology ePrint Archive 2009
Kazumaro Aoki Jian Guo Krystian Matusiewicz Yu Sasaki Lei Wang

In this paper, we present preimage attacks on up to 43step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly increases the number of attacked steps compared to the best previously published preimage attack working for 24 steps. The time complexities are 2, 2 for finding pseudo-preimages and 2, 2 compression function operatio...

2008
Sebastiaan Indesteege Florian Mendel Bart Preneel Christian Rechberger

We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision attacks on SHA-256 reduced to 23 and 24 steps with complexities 2 and 2, respectively. We give example colliding message pairs for 23-step and 24-step SHA-256. The best previous, recently obtained result was a collision attack for up to 22 steps. We extend our attacks to 23 and 24-step reduced SH...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید