نتایج جستجو برای: fischerella sp sha
تعداد نتایج: 122273 فیلتر نتایج به سال:
To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified securit...
Software implementation of Hash function have not been able to offer satisfactory performances for various application thus far. Additionally, SHA-3 and SHAKE, which utilize SHA-3, are extensively utilized in many Post Quantum Cryptosystem (PQC) . Therefore, there is a need research optimize the software environments. Our proposal involves an optimized on GPU environment. To improve performance...
Recently, Indesteege et al. [1] had described attacks against 23 and 24-step SHA-512 at SAC ’08. Their attacks are based on the differential path by Nikolić and Biryukov [2]. The reported complexities are 2 and 2 calls to the respective step reduced SHA-512 hash function. They provided colliding message pairs for 23-step SHA-512 but did not provide a colliding message pair for 24-step SHA-512. ...
This technical report presents an efficient implementation of the commonly used hash algorithm SHA-1. The SHA-1 algorithm is widely used in various public-key cryptography algorithms, and therefore efficient hardware implementation of SHA-1 is of great importance. A thorough presentation of the implementation techniques is presented. The design was implemented on a Xilinx Virtex-II XC2V2000-6 F...
SHA-256 is a cryptographic hash function which was proposed in 2000 as a new generation of SHA functions and was adopted as FIPS standard in 2002. In this paper we will consider a SHA-256 variant and a SHACAL-2 variant in which every arithmetic addition is replaced by XOR operation. We call the SHA-256 variant SHA-2-XOR and the SHACAL-2 variant SHACAL-2-XOR respectively. We will present a diffe...
Recently, Wang proposed a new method to cryptanalyze SHA-1 and found collisions of 58-round SHA-1. However many details of Wang’s attack are still unpublished, especially, 1) How to find differential paths? 2) How to modify messages properly? For the first issue, some results have already been reported. In our article, we clarify the second issue and give a sophisticated method based on Gröbner...
Low molecular weight fragmentation products of the polysaccharide of Hyaluronic acid (sHA) produced during inflammation have been shown to be potent activators of immunocompetent cells such as dendritic cells (DCs) and macrophages. Here we report that sHA induces maturation of DCs via the Toll-like receptor (TLR)-4, a receptor complex associated with innate immunity and host defense against bac...
تابع درهم ساز یکی از ابزارهای مهم در رمزنگاری و تشخیص اصالت پیام محسوب می شود که فرم کلیددار این تابع برای mac و فرم بدون کلید آن در mdc مورداستفاده قرار می گیرد. در طراحی این گونه توابع، سرعت و امنیت پارامترهای مهمی برای کاربردهای مختلف رمزنگاری می باشند. توابع درهم ساز پرکاربرد در این زمینه md5، sha-0، sha-1 و sha-2 می باشند که به شکل های مختلف موردحمله قرار گرفته اند. توابع یاد شده، با ساختا...
What is the diversity of cyanobacteria in iron-depositing hot springs? We are currently conducting preliminary studies on the diversity of iron-tolerant CB isolated from irondepositing hot springs in and around Yellowstone National Park (WY, USA). Molecular analysis has confirmed the prediction [1] that the diversity of iron-tolerant CB is ill-defined. Analysis of 16S rRNA sequences from 15 uni...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید