نتایج جستجو برای: fischerella sp sha

تعداد نتایج: 122273  

2012
Piyush Garg Namita Tiwari

To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified securit...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

Software implementation of Hash function have not been able to offer satisfactory performances for various application thus far. Additionally, SHA-3 and SHAKE, which utilize SHA-3, are extensively utilized in many Post Quantum Cryptosystem (PQC) . Therefore, there is a need research optimize the software environments. Our proposal involves an optimized on GPU environment. To improve performance...

Journal: :CoRR 2008
Somitra Kumar Sanadhya Palash Sarkar

Recently, Indesteege et al. [1] had described attacks against 23 and 24-step SHA-512 at SAC ’08. Their attacks are based on the differential path by Nikolić and Biryukov [2]. The reported complexities are 2 and 2 calls to the respective step reduced SHA-512 hash function. They provided colliding message pairs for 23-step SHA-512 but did not provide a colliding message pair for 24-step SHA-512. ...

2016
Kimmo Järvinen

This technical report presents an efficient implementation of the commonly used hash algorithm SHA-1. The SHA-1 algorithm is widely used in various public-key cryptography algorithms, and therefore efficient hardware implementation of SHA-1 is of great importance. A thorough presentation of the implementation techniques is presented. The design was implemented on a Xilinx Virtex-II XC2V2000-6 F...

2005
Hirotaka Yoshida Alex Biryukov

SHA-256 is a cryptographic hash function which was proposed in 2000 as a new generation of SHA functions and was adopted as FIPS standard in 2002. In this paper we will consider a SHA-256 variant and a SHACAL-2 variant in which every arithmetic addition is replaced by XOR operation. We call the SHA-256 variant SHA-2-XOR and the SHACAL-2 variant SHACAL-2-XOR respectively. We will present a diffe...

Journal: :IACR Cryptology ePrint Archive 2006
Makoto Sugita Mitsuru Kawazoe Hideki Imai

Recently, Wang proposed a new method to cryptanalyze SHA-1 and found collisions of 58-round SHA-1. However many details of Wang’s attack are still unpublished, especially, 1) How to find differential paths? 2) How to modify messages properly? For the first issue, some results have already been reported. In our article, we clarify the second issue and give a sophisticated method based on Gröbner...

Journal: :The Journal of Experimental Medicine 2002
Christian Termeer Frauke Benedix Jonathon Sleeman Christina Fieber Ursula Voith Thomas Ahrens Kensuke Miyake Marina Freudenberg Christopher Galanos Jan Christoph Simon

Low molecular weight fragmentation products of the polysaccharide of Hyaluronic acid (sHA) produced during inflammation have been shown to be potent activators of immunocompetent cells such as dendritic cells (DCs) and macrophages. Here we report that sHA induces maturation of DCs via the Toll-like receptor (TLR)-4, a receptor complex associated with innate immunity and host defense against bac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه محقق اردبیلی - دانشکده کامپیوتر و فناوری اطلاعات 1394

تابع درهم ساز یکی از ابزارهای مهم در رمزنگاری و تشخیص اصالت پیام محسوب می شود که فرم کلیددار این تابع برای mac و فرم بدون کلید آن در mdc مورداستفاده قرار می گیرد. در طراحی این گونه توابع، سرعت و امنیت پارامترهای مهمی برای کاربردهای مختلف رمزنگاری می باشند. توابع درهم ساز پرکاربرد در این زمینه md5، sha-0، sha-1 و sha-2 می باشند که به شکل های مختلف موردحمله قرار گرفته اند. توابع یاد شده، با ساختا...

2006
Igor Brown Daniel Mummey Svetlana Sarkisova Carlton Allen David S. McKay

What is the diversity of cyanobacteria in iron-depositing hot springs? We are currently conducting preliminary studies on the diversity of iron-tolerant CB isolated from irondepositing hot springs in and around Yellowstone National Park (WY, USA). Molecular analysis has confirmed the prediction [1] that the diversity of iron-tolerant CB is ill-defined. Analysis of 16S rRNA sequences from 15 uni...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید