نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

2009
Praveen Gauravaram Lars R. Knudsen Krystian Matusiewicz Florian Mendel Christian Rechberger Martin Schläffer Søren S. Thomsen

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about th...

Journal: :RFC 2011
Donald E. Eastlake Tony Hansen

The United States of America has adopted a suite of Secure Hash Algorithms (SHAs), including four beyond SHA-1, as part of a Federal Information Processing Standard (FIPS), namely SHA-224, SHA-256, SHA-384, and SHA-512. This document makes open source code performing these SHA hash functions conveniently available to the Internet community. The sample code supports input strings of arbitrary bi...

Journal: :Int. Arab J. Inf. Technol. 2012
Thulasimani Lakshmanan Madheswaran Muthusamy

Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new Secure Hash Algorithm called (SHA-192). It uses a famous secure hash algorithm given by the National Institute of Standard and Technology (NIST).The basic design of SHA192 is to have the output length of 192.The ...

2004
Valery A. Zheludev

We discuss here wavelets constructed from periodic spline functions. Our approach is based on a new computational technique named Spline Harmonic Analysis (SHA). SHA to be presented is a version of harmonic analysis operating in the spaces of periodic splines of defect 1 with equidistant nodes. Discrete Fourier Transform is a special case of SHA. The continuous Fourier Analysis is the limit cas...

2006
Florian Mendel Norbert Pramstaller Christian Rechberger Vincent Rijmen

This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying techniques known so far to SHA-256. Next we introduce a new type of perturbation vector which circumvents the identified limits. This new technique is then applied to the unmodified SHA-256. Exploiting the combination of Boole...

Journal: :IACR Cryptology ePrint Archive 2004
Eli Biham Rafi Chen

In this paper we find two near-collisions of the full compression function of SHA-0, in which up to 142 of the 160 bits of the output are equal. We also find many full collisions of 65-round reduced SHA-0, which is a large improvement to the best previous result of 35 rounds. We use the very surprising fact that the messages have many neutral bits, some of which do not affect the differences fo...

2013
Edward Bezkor

Background and Purpose: Current musculoskeletal interventions for neck pain that do not address a person’s fear avoidance beliefs about work and physical activity may have poor long-term outcomes. Research indicates a strong correlation between a person’s score on the Fear Avoidance Beliefs Questionnaire (FABQ) and risk of chronic neck and back pain. Gua sha, a traditional Chinese medical inter...

2012
Elena Andreeva Bart Mennink Bart Preneel Marjan Skrobot

In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to the vulnerabilities identified in widely employed hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. At present, 5 candidates are left in the third round of the competition. An import...

2017
Shuang G. Yan Di Li Shuai Yin Xingyi Hua Jian Tang Florian Schmidutz

BACKGROUND Short-stem total hip arthroplasty (SHA) has been increasingly used in the treatment of hip arthroplasty. However, it is unclear whether there is a superiority of SHA in periprosthetic bone remodeling over standard stem total hip arthroplasty (THA). This meta-analysis of randomized-controlled trials (RCTs) compared the periprosthetic bone remodeling after SHA and THA. METHODS PubMed...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید