نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

2011
Sinan Huang Dinesh Ganta Meeta Srivastav Xuefen Wang

(Abstract) Cryptographic hash functions are used extensively in information security, most notably in digital authentication and data integrity verification. Their performance is an important factor of the overall performance of a secure system. In 2005, some groups of cryptanalysts were making increasingly successful attacks and exploits on the cryptographic hash function, SHA-1, the most wide...

Journal: :IACR Cryptology ePrint Archive 2012
Daniel J. Bernstein Tanja Lange

This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark­ ing of All Submitted Hashes) project. New graphs are automatically posted at the top of http:...

2012
Marjan Škrobot Elena Andreeva Bart Mennink

Hash functions are fundamental cryptographic primitives that compress messages of arbitrary length into message digests of a fixed length. They are used as the building block in many important security applications such as digital signatures, message authentication codes, password protection, etc. The three main security properties of hash functions are collision, second preimage and preimage r...

2017
Zahid Raja Sonia André Feten Abbassi Vincent Humblot Olivier Lequin Tahar Bouceba Isabelle Correia Sandra Casale Thierry Foulon Denis Sereno Bruno Oury Ali Ladram

Antimicrobial peptides (AMPs) are promising drugs to kill resistant pathogens. In contrast to bacteria, protozoan parasites, such as Leishmania, were little studied. Therefore, the antiparasitic mechanism of AMPs is still unclear. In this study, we sought to get further insight into this mechanism by focusing our attention on temporin-SHa (SHa), a small broad-spectrum AMP previously shown to be...

Journal: :CIT 2013
Harshvardhan Tiwari Krishna Asawa

Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-0, SHA-1 and RIPEMD-160 are built on Merkle-Damgård iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions a...

2012
Jens-Peter Kaps Panasayya Yalla Kishore Kumar Surapathi Bilal Habib Susheel Vadlamudi Smriti Gurung

The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third round. One evaluation criterion is the ability of the candidate algorithm to be implemented on resource-constrained platforms. This includes FPGAs for embedded and hand-held devices. In this paper we present two sets of lightweight implementations of all SHA-3 finalists and SHA-2, one using only...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

Journal: :فصلنامه علمی پژوهشی تاریخ اسلام 0
محمد علی رنجبر عضو هیئت علمی گروه تاریخ دانشگاه یزد

member of the teaching staff in yazd university. the musha'sha'ids'uprising in south region of mesopotamia and khoozestan was performed under the sayyid mohammad b.falah's leadership (died in 870 a.h.) and then shiite's centeral government under the centerality of hoveizeh was established. until now, we don,t have considerable works about sayyid mohammad b.falah's ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید