نتایج جستجو برای: sha 3
تعداد نتایج: 1812667 فیلتر نتایج به سال:
(Abstract) Cryptographic hash functions are used extensively in information security, most notably in digital authentication and data integrity verification. Their performance is an important factor of the overall performance of a secure system. In 2005, some groups of cryptanalysts were making increasingly successful attacks and exploits on the cryptographic hash function, SHA-1, the most wide...
This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark ing of All Submitted Hashes) project. New graphs are automatically posted at the top of http:...
Hash functions are fundamental cryptographic primitives that compress messages of arbitrary length into message digests of a fixed length. They are used as the building block in many important security applications such as digital signatures, message authentication codes, password protection, etc. The three main security properties of hash functions are collision, second preimage and preimage r...
Antimicrobial peptides (AMPs) are promising drugs to kill resistant pathogens. In contrast to bacteria, protozoan parasites, such as Leishmania, were little studied. Therefore, the antiparasitic mechanism of AMPs is still unclear. In this study, we sought to get further insight into this mechanism by focusing our attention on temporin-SHa (SHa), a small broad-spectrum AMP previously shown to be...
Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-0, SHA-1 and RIPEMD-160 are built on Merkle-Damgård iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions a...
The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third round. One evaluation criterion is the ability of the candidate algorithm to be implemented on resource-constrained platforms. This includes FPGAs for embedded and hand-held devices. In this paper we present two sets of lightweight implementations of all SHA-3 finalists and SHA-2, one using only...
member of the teaching staff in yazd university. the musha'sha'ids'uprising in south region of mesopotamia and khoozestan was performed under the sayyid mohammad b.falah's leadership (died in 870 a.h.) and then shiite's centeral government under the centerality of hoveizeh was established. until now, we don,t have considerable works about sayyid mohammad b.falah's ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید