نتایج جستجو برای: 160)

تعداد نتایج: 30605  

Journal: :IACR Cryptology ePrint Archive 2006
Florian Mendel Vincent Rijmen

We present a collision attack on the hash function HAS-160 reduced to 53-steps. The attack has a complexity of about 2 hash computations. The attack is based on the work of Cho et al. presented at ICISC 2006. In this article, we improve their attack complexity by a factor of about 2 using a slightly different strategy for message modification in the first 20 steps of the hash function.

2013
Aleksandar Kircanski Riham AlTawy Amr M. Youssef

The question of compatibility of differential paths plays a central role in second order collision attacks on hash functions. In this context, attacks typically proceed by starting from the middle and constructing the middle-steps quartet in which the two paths are enforced on the respective faces of the quartet structure. Finding paths that can fit in such a quartet structure has been a major ...

Journal: :Journal of Biological Chemistry 1989

Journal: :Plastic and Reconstructive Surgery - Global Open 2020

Journal: :The Journal of infectious diseases 1999
K V Sitz S Ratto-Kim A S Hodgkins M L Robb D L Birx

The proliferative responses to a series of peptides constituting the human immunodeficiency virus type 1 (HIV-1) gp120 sequence were evaluated in 19 HIV-1-infected rgp160 vaccine recipients, 17 HIV-1-infected rgp120 vaccine recipients, 15 HIV-1-infected placebo recipients, and 18 HIV-1-uninfected controls. Many regions of the gp120 molecule were found to contribute proliferative epitopes, altho...

2011
Ahmed and Ahmed

This study was carried out between May and October, 2010 to morphologically identify Anopheles species in parts of Kano State. A total of 2374 Anopheles were collected and identified. 1782 (75.07%) were collected from Nassarawa Local Government Area while 592 (24.93%) were collected from Tarauni Local Government Area. Using Anopheles characters of Gilles and Coetzee (1987) under zeiss light mic...

2005
Charles A. Ferguson

straightforward indexes of identity. This lacks analytic validity but reveals the linguistic ideologies upon which the politics of nationalism often turn (Bauman and Briggs 2003). Following Stewart (2001), we should be cautious of modern notions that linguistic form (e.g., Bengali discourse full of Sanskritor Perso-Arabic-derived words) directly reflects an author’s politico-religious stance or...

2013
Matthew T. Robinson Alan C. Heffner

Chemical Buffering Extracellular buffers, including plasma proteins, phosphates, and bicarbonate, are the earliest defense against acidosis. The most prominent extracellular buffer is bicarbonate, which is highly abundant and acts as a dynamic buffer by independently regulating Pco2 through changes in alveolar ventilation. This feature increases buffering capacity by more than 10-fold. Bufferin...

2005
Err-Cheng Chan Pi-Yueh Chang Tsu-Lan Wu James T. Wu

An enzymatic assay for plasma homocysteine was developed that uses a crude lysate of E. coli containing the recombinant enzyme, methionine γ-lyase. The assay uses a commercially available fluorophore and 96-well microtiter plates; it can be performed manually or with the TECAN automated analyzer. The CVs for within-run and between-run precision are <10%. Close correlation (r >0.9) was obtained ...

2006
Florian C Oberstrass Albert Lee Richard Stefl Michael Janis Guillaume Chanfreau Frédéric H-T Allain

Although the abundant sterile alpha motif (SAM) domain was originally classified as a protein-protein interaction domain, it has recently been shown that certain SAM domains have the ability to bind RNA, defining a new type of post-transcriptional gene regulator. To further understand the function of SAM-RNA recognition, we determined the solution structures of the SAM domain of the Saccharomyc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید