Academic literature on the topic 'Hash function SHA-1'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hash function SHA-1.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hash function SHA-1"

1

Suhaili, Shamsiah binti, and Takahiro Watanabe. "High-Throughput of SHA-256 Hash Function with Unfolding Transformation." Global Journal of Engineering and Technology Review Vol.4 (4) October-December. 2019 4, no. 4 (2019): 73–81. http://dx.doi.org/10.35609/gjetr.2019.4.4(1).

Full text
Abstract:
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. This algorithm is important for security applications such as Keyed-Hash Message Authentication Code (HMAC), digital signature, and others. There are different types of hash functions such as MD5, SHA-1, RIPEMD-160, SHA-256, SHA-224, SHA-384, SHA-512, and others. In this paper, the unfolding transformation method was proposed to improve the throughput of the SHA-256 hash function. Three types of SHA-256 hash function were designed namely S
APA, Harvard, Vancouver, ISO, and other styles
2

Korona, Mateusz, Paweł Szumełda, Mariusz Rawski, and Artur Janicki. "Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe." Electronics 11, no. 11 (2022): 1688. http://dx.doi.org/10.3390/electronics11111688.

Full text
Abstract:
In this article we address the problem of efficient and secure monitoring of computer network traffic. We proposed, implemented, and tested a hardware-accelerated implementation of a network probe, using the DE5-Net FPGA development platform. We showed that even when using a cryptographic SHA-3 hash function, the probe uses less than 17% of the available FPGA resources, offering a throughput of over 20 Gbit/s. We have also researched the problem of choosing an optimal hash function to be used in a network probe for addressing network flows in a flow cache. In our work we compared five 32-bit h
APA, Harvard, Vancouver, ISO, and other styles
3

Prof., Pawan Kumar* Dr. Harsh Dev. "ALGORITHMIC DESIGN AND ANALYSIS OF CRYPTOGRAPHIC SHA-256 HASH FUNCTION WITH PROPOSED SHA-288 HASH MODEL." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 160–64. https://doi.org/10.5281/zenodo.290136.

Full text
Abstract:
Cryptography is the art of providing security to the message .It gives freedom to the user from hacking of the original message. The here are multiple techniques to provide cryptographic security to the message but this paper focus on the SHA-256 hash function and its extended proposed model SHA-288 for better security. The basic structure of maximum hash functions is based on the Merkle- Damgard construction. Most of the hash functions are used for information security purposes such as digital signature, password authentication; message authentication etc.The hash algorithms perform security
APA, Harvard, Vancouver, ISO, and other styles
4

Tiwari, Harshvardhan. "Merkle-Damgård Construction Method and Alternatives." Journal of information and organizational sciences 41, no. 2 (2017): 283–304. http://dx.doi.org/10.31341/jios.41.2.9.

Full text
Abstract:
Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method with constant initialization vector. Merkle-Damgård construction showed that the security of hash function depends on the security of the compression function. Several attacks on Merkle-Damgård construction based hash functions motivated researchers to propose different cryptographic constructions to enhance the security of hash functions again
APA, Harvard, Vancouver, ISO, and other styles
5

Malviya, Iti, and Tejasvini Chetty. "Performance and Limitation Review of Secure Hash Function Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 6 (2019): 48–51. http://dx.doi.org/10.17762/ijritcc.v7i6.5323.

Full text
Abstract:
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is expected to be a confined limit, that is, a limit which is infeasible to adjust. Hash Functions are significant instrument in information security over the web. The hash functions that are utilized in different security related applications are called cryptographic hash functions. This property is additionally valuable in numerous different appl
APA, Harvard, Vancouver, ISO, and other styles
6

Kahri, Fatma, Hassen Mestiri, Belgacem Bouallegue, and Mohsen Machhout. "High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor." Journal of Circuits, Systems and Computers 25, no. 04 (2016): 1650026. http://dx.doi.org/10.1142/s0218126616500262.

Full text
Abstract:
Cryptographic hash functions are at the heart of many information security applications like message authentication codes (MACs), digital signatures and other forms of authentication. One of the methods to ensure information integrity is the use of hash functions, which generates a stream of bytes (hash) that must be unique. But most functions can no longer prevent malicious attacks and ensure that the information have just a hash. Because of the weakening of the widely used SHA-1 hash algorithm and concerns over the similarly-structured algorithms of the SHA-2 family, the US National Institut
APA, Harvard, Vancouver, ISO, and other styles
7

M. Al-Nawashi, Malek, Obaida M. Al-hazaimeh, Isra S. Al-Qasrawi, Ashraf A. Abu-Ein, and Monther H. Al-Bsool. "Analysis and Evolution of SHA-1 Algorithm - Analytical Technique." International journal of Computer Networks & Communications 16, no. 3 (2024): 89–101. http://dx.doi.org/10.5121/ijcnc.2024.16306.

Full text
Abstract:
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several di
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Umesh, and V. Ch Venkaiah. "An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–27. http://dx.doi.org/10.4018/ijcac.308275.

Full text
Abstract:
Cryptographic hash functions and HMACs are used to achieve various security goals such as message integrity, message authentication, digital signatures, and entity authentication. This article proposes (1) a new hash function (QGMD5-384) and (2) an efficient message authentication code (QGMAC-384) based on a quasigroup. A quasigroup is a non-associative algebraic structure and its number grows exponentially with its order. Note that the existing hash functions and HMACs that use quasigroups are vulnerable to prefix and suffix attacks. The security of the proposed hash function is analyzed by c
APA, Harvard, Vancouver, ISO, and other styles
9

Rechberger, Christian, and Vincent Rijmen. "New Results on NMAC/HMAC when Instantiated with Popular Hash Functions." JUCS - Journal of Universal Computer Science 14, no. (3) (2008): 347–76. https://doi.org/10.3217/jucs-014-03-0347.

Full text
Abstract:
Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial applications is HMAC based on the hash functions MD5 or SHA-1. In the light of new collision search methods for members of the MD4 family including SHA-1, the security of HMAC based on these hash functions is reconsidered. We present a new method to recover both the inner- and the outer key used in HMAC when instantiated with a concrete hash function by observing text/MAC pairs. In addition to collisions, also other non-random properties of
APA, Harvard, Vancouver, ISO, and other styles
10

Ali Al-Hammadi, Yousef, and Mohamed Fadl Idris Fadl. "Reducing Hash Function Complexity: MD5 and SHA-1 as Examples." International Journal of Mathematical Sciences and Computing 5, no. 1 (2019): 1–17. http://dx.doi.org/10.5815/ijmsc.2019.01.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hash function SHA-1"

1

Beran, Martin. "Elektronická podatelna VUT 2." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412777.

Full text
Abstract:
This dissertation thesis attends to problems of electronic registry for VUT. It deals with the principal of electronic registry functioning, electronic signature and it compares offer of the commercial registries. It goes in for the proposal and implementation of the electronic registry for VUT. Since the using of the e- registry on all public service Office was legalized the people can avoid long queues and the employees are avoided from the stress before dead lines. By the communication through the electronic registry is very important the electronical signature. It is almost a full-valued a
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Ting-Yi, and 李庭怡. "Hardware design and implementation of hash function SHA-1." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/28194991076214709941.

Full text
Abstract:
碩士<br>國立交通大學<br>電信工程系<br>90<br>The processing speed of cryptographic algorithms in IP Security (IPSec) has received much attention in recent research, and it has been shown that software design and implementation performs poorly in either encryption or authentication. There is an increasing interest in high-speed cryptographic accelerators for IPSec applications such as Virtual Private Networks (VPN). Hence, as we shall show in this thesis, it’s necessary and reasonable to construct cryptographic accelerators using hardware design and implementation of HMACs based on a hash algorithm such as S
APA, Harvard, Vancouver, ISO, and other styles
3

Galaczová, Barbora. "Bezpečnost a použitelnost základních hashovacích funkcí, zejména MD-5, SHA-1 a SHA-2." Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-313898.

Full text
Abstract:
Title: Security and usability of standard hash functions, in particular MD-5, SHA-1 and SHA-2 Author: Galaczová Barbora Department: Department of Algebra Supervisor: Doc. RNDr. Tůma Jiří, DrSc., Department of Algebra Consultant: Ing. Budiš Petr, Ph.D. Abstract: In the present work we try to digestedly describe standard hash functions, in particular MD-5, SHA-1 and SHA-2. We describe resume of existing attacks on these hash functions. We closely focused on MD-5 collision attacks, because the other hash function collision attacks result from these. Next we describe posibilities of practical usag
APA, Harvard, Vancouver, ISO, and other styles
4

Chu, Tien-Pin, and 朱田彬. "On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Technologies." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/v5g3v6.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程學系<br>105<br>The development of Internet of Things (IoT) has changed traditional ideas of networks. However, security issues have become major obstacles to the deployment of IoT, which commonly adopts hash functions for security authentication. The Secure Hash Algorithm (SHA), published by the National Institute of Standards and Technology, is a family of cryptographic hash functions, including SHA-0, SHA-1, SHA-2, and SHA-3. SHA can be used to compute fixed-length digits called message digests for digital messages. SHA-1 is not invertible and has been widely used in security
APA, Harvard, Vancouver, ISO, and other styles
5

Εμερετλής, Ανδρέας. "Μεθοδολογία και υλοποίηση secure hash αλγορίθμων σε FPGA". Thesis, 2012. http://hdl.handle.net/10889/5622.

Full text
Abstract:
Οι κρυπτογραφικές συναρτήσεις κατακερματισμού αποτελούν στις μέρες μας ένα από τα δημοφιλέστερα συστατικά των κρυπτογραφικών συστημάτων, λόγω των ιδιαίτερων ιδιοτήτων τους. Λαμβάνοντας υπόψη τη συνεχή αύξηση του όγκου δεδομένων και των ταχυτήτων επικοινωνίας, η χρήση μιας συνάρτησης κατακερματισμού με χαμηλή ρυθμοαπόδοση μπορεί να επιβραδύνει το συνολικό ψηφιακό τηλεπικοινωνιακό σύστημα. Ο σχεδιασμός ενός δεδομένου αλγορίθμου κατακερματισμού ώστε να έχει τη βέλτιστη ρυθμοαπόδοση αποτελεί ζήτημα μεγάλης σημασίας. Στη συγκεκριμένη διπλωματική εργασία παρουσιάζεται μια μεθοδολογία σχεδιασμού με
APA, Harvard, Vancouver, ISO, and other styles
6

Zimmermannová, Jana. "Vývoj a využití hašovacích funkcí při zpracování informací." Master's thesis, 2012. http://www.nusl.cz/ntk/nusl-304187.

Full text
Abstract:
At the end of 70th of last century the concept began to emerge, now is referred as a cryptographic hash function. Currently, these functions are associated especially with a digital signature. In 2005, the worldwide most used function SHA-1 was broken. This fact led in 2007 NIST announced a public competition to create a new secure hash algorithm. This Thesis deals with issues of cryptographic hash functions from the beginning of their theoretical formulation to current events in this area. Key words: Cryptographic hash functions, SHA-1, MD5, NIST competition
APA, Harvard, Vancouver, ISO, and other styles
7

Μιχαήλ, Χαράλαμπος. "Βελτιστοποίηση επαναπροσδιοριζομένων αρχιτεκτονικών για απόδοση και κατανάλωση ενέργειας σε κρυπτογραφικές εφαρμογές κυριαρχούμενες από δεδομένα". Thesis, 2009. http://nemertes.lis.upatras.gr/jspui/handle/10889/2829.

Full text
Abstract:
Στη παρούσα διδακτορική διατριβή του κ. Χαράλαμπου Μιχαήλ με τίτλο «Βελτιστοποίηση Επαναπροσδιοριζόμενων Αρχιτεκτονικών για Απόδοση και Κατανάλωση Ενέργειας για Κρυπτογραφικές Εφαρμογές και Εφαρμογές Κυριαρχούμενες από Δεδομένα» προτείνονται, αναπτύσσονται και μελετώνται αποδοτικές τεχνικές βελτιστοποίησης της απόδοσης ή/και της κατανάλωσης ενέργειας για κρυπτογραφικές εφαρμογές καθώς και εφαρμογές κυριαρχούμενες από δεδομένα που υλοποιούνται σε ενσωματωμένες πλατφόρμες ειδικού σκοπού. Συνολικά, οι προτεινόμενες τεχνικές μελετήθηκαν για τις διάφορες παραμέτρους που έχουν και συνολικά οδήγησαν
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Hash function SHA-1"

1

Shengelia, Revaz. Modern Economics. Universal, Georgia, 2021. http://dx.doi.org/10.36962/rsme012021.

Full text
Abstract:
Economy and mankind are inextricably interlinked. Just as the economy or the production of material wealth is unimaginable without a man, so human existence and development are impossible without the wealth created in the economy. Shortly, both the goal and the means of achieving and realization of the economy are still the human resources. People have long ago noticed that it was the economy that created livelihoods, and the delays in their production led to the catastrophic events such as hunger, poverty, civil wars, social upheavals, revolutions, moral degeneration, and more. Therefore, the
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Hash function SHA-1"

1

Kim, Mooseop, Jaecheol Ryou, and Sungik Jun. "Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module." In Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Michail, H. E., A. P. Kakarountas, George N. Selimis, and Costas E. Goutis. "Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556930_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lien, Roar, Tim Grembowski, and Kris Gaj. "A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512." In Topics in Cryptology – CT-RSA 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24660-2_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pramstaller, Norbert, Christian Rechberger, and Vincent Rijmen. "Impact of Rotations in SHA-1 and Related Hash Functions." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11693383_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Grembowski, Tim, Roar Lien, Kris Gaj, et al. "Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kitsos, Paris. "System-on-Chip Design of the Whirlpool Hash Function." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch017.

Full text
Abstract:
In this chapter, a system-on-chip design of the newest powerful standard in the hash families, named Whirlpool, is presented. With more details an architecture and two very large-scale integration (VLSI) implementations are presented. The first implementation is suitable for high speed applications while the second one is suitable for applications with constrained silicon area resources. The architecture permits a wide variety of implementation tradeoffs. Different implementations have been introduced and each specific application can choose the appropriate speed-area, trade-off implementation. The implementations are examined and compared in the security level and in the performance by using hardware terms. Whirlpool with RIPEMD, SHA-1, and SHA-2 hash functions are adopted by the International Organization for Standardization (ISO/IEC, 2003) 10118-3 standard. The Whirlpool implementations allow fast execution and effective substitution of any previous hash families’ implementations in any cryptography application.
APA, Harvard, Vancouver, ISO, and other styles
7

Quantin Catherine, Bouzelat Hocine, and Dusserre Liliane. "A computerized record hash coding and linkage procedure to warrant epidemiological follow-up data security." In Studies in Health Technology and Informatics. IOS Press, 1997. https://doi.org/10.3233/978-1-60750-887-8-339.

Full text
Abstract:
A computerized record hash coding and linkage procedure is proposed to allow the chaining of medical information within the framework of epidemiological follow-up. Before their extraction, files are rendered anonymous using a one-way hash coding based on the SHA function, in order to respect the legislation on data privacy and security. To avoid dictionary attacks, two keys have been added to SHA coding. Once rendered anonymous, the linkage of patient information can be accomplished by the means of a statistical model, taking into account several identification variables.
APA, Harvard, Vancouver, ISO, and other styles
8

Nandagopal, Radha, and Kristina Rother. "Case 78: Psychosocial Stressors and Management in an Adolescent with Type 2 Diabetes." In Diabetes Case Studies: Real Problems, Practical Solutions. American Diabetes Association, 2015. http://dx.doi.org/10.2337/9781580405713.78.

Full text
Abstract:
A 13-year-old African American girl presented to the pediatric emergency department at an urban hospital with complaints of vaginal pruritus and dysuria. She also noted that she has been drinking more water throughout the day and was awakening at night to urinate for the past month. Her BMI was 39 kg/m2. On examination, she was found to have severe cervical acanthosis nigricans and copious white vaginal discharge. Workup revealed a vaginal candida infection, 4+ urine glucose, 1+ urine ketones, and blood glucose (BG) of 563 mg/dL (31.3 mmol/L), but otherwise normal serum chemistries, including normal renal and liver function.
APA, Harvard, Vancouver, ISO, and other styles
9

Fowler, Catherine. "‘My dearest little girl, I just got your letter and I hope that you will continue to write to me often’." In Epistolary Entanglements in Film, Media and the Visual Arts. Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463729666_ch02.

Full text
Abstract:
Once seen as alternative, arthouse, or experimental, Chantal Akerman’s film News from Home (1976) has been transformed into a kind of ur-text for thinking about how the epistolary crosses over with the essayistic. In this chapter I argue that these discussions of the epistolary essayistic have placed too much emphasis upon the letter’s function as an ‘emblem of distance’; instead, my discussion will emphasize the epistolary as a ‘bridge’1 in order to explore how, when transposed to the cinematic context, epistolarity can bring about listening. In the case of Chantal Akerman’s practice, epistolary listening constitutes an ethical position through which she finds her authorial voice.
APA, Harvard, Vancouver, ISO, and other styles
10

Collier, James Lincoln. "The Critics." In Jazz. Oxford University PressNew York, NY, 1993. http://dx.doi.org/10.1093/oso/9780195079432.003.0009.

Full text
Abstract:
Abstract Criticism has a long history. Its practitioners include some of the most imposing names in arts and letters, from Plato to George Bernard Shaw, from DaVinci to Ezra Pound. Yet, despite the fame of some workers in this field, the craft has always been somewhat suspect. What, really, does the critic contribute? Who elected him to his office? What business does he have to tell artists, who are presumed to be able to do something the critic cannot, how to achieve their efforts, and indeed what effects they ought to achieve? It has seemed to a good many working artists-if we must use that dreadful term-that the primary function of criticism is to assert the superiority of the critic over the artist. That, certainly, was the case with the deconstructionists, who managed blandly to assert that the writer had no idea what his work meant, and it was up to the critic to explain it to him. 1 Given how
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hash function SHA-1"

1

Kushwaha, Aditya, Shalini Vardhan, and Neeraj Goel. "Engineering MoSe2 Defects via SHI Irradiation for Improved NH3 Gas Sensing: A DFT Study." In JSAP-Optica Joint Symposia. Optica Publishing Group, 2024. https://doi.org/10.1364/jsapo.2024.18a_a35_6.

Full text
Abstract:
Ammonia (NH3) gas, common in agriculture and industry, is toxic and necessitates real-time monitoring due to unreliable odour detection[1]. While two-dimensional (2D) transition metal dichalcogenides (TMDs) offer promising NH3 gas sensor properties due to improved sensitivity, selectivity, and fast response [2]. However, their dense stacking structure limits gas interaction, reducing sensitivity at room temperature. To overcome this, our study presents theoretical findings on utilizing swift heavy ions (SHI) irradiation to induce targeted defects in the MoSe2 lattice [3], thereby enhancing NH3
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Guoping. "An Efficient Implementation of SHA-1 Hash Function." In 2006 IEEE International Conference on Electro/Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/eit.2006.252210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kakarountas, A. P., G. Theodoridis, T. Laopoulos, and C. E. Goutis. "High-Speed FPGA Implementation of the SHA-1 Hash Function." In 2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IEEE, 2005. http://dx.doi.org/10.1109/idaacs.2005.282972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jae-woon Kim, Hu-ung Lee, and Youjip Won. "Design for high throughput SHA-1 hash function on FPGA." In 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2012. http://dx.doi.org/10.1109/icufn.2012.6261737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004059302700275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Docherty, James, and Albert Koelmans. "A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions." In 2011 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2011. http://dx.doi.org/10.1109/iscas.2011.5937967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Odat, Zeyad, and Samee Khan. "The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.00119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kester, John J., William R. White, and Paul J. Wolf. "Harmonic generation in thin film doped silica waveguides." In OSA Annual Meeting. Optica Publishing Group, 1992. http://dx.doi.org/10.1364/oam.1992.tup2.

Full text
Abstract:
Second harmonic generation (SHG) has been produced in waveguiding films of doped silica. The film was prepared by simultaneous illumination at 1064 and 532 nm radiation by using a prism coupling technique. Subsequent illumination by 1064 nm irradiation produced 532 nm radiation. The intensity of the film-generated 532 nm grew as a function of time until it saturated with an efficiency of about 1 %. Film-generated SHG produced by p-polarized 1064 nm incident light grew an order of magnitude faster than that produced by s-polarized light. The saturated SHG intensities for these input polarizatio
APA, Harvard, Vancouver, ISO, and other styles
9

Yeh, Chao Y., J. C. Diels, Feiling Wang, and Adam Wu. "Nonlinear-optical properties of thin films." In OSA Annual Meeting. Optica Publishing Group, 1990. http://dx.doi.org/10.1364/oam.1990.tud6.

Full text
Abstract:
We report measurements of harmonic generation in thin films of BBO and PLZT. Sputtered thin films of BBO exhibit the largest second-harmonic conversion (SHG), with an efficiency as high as 10-6 for a thickness of only 1 μm. Interdigitated Cr-Au electrodes were deposited for measurement of field-induced SHG on PLZT samples. Second-harmonic generation was measured using a Q-switched, mode-locked picosecond pulse train from a Nd:YAG laser. No damage was observed for intensities above 20 GW/cm2. In the case of PLZT films, plots of SHG as a function of electric field, varying from −3 × 105 to 3 × 1
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, J. T., R. E. McKinney, S. L. Savrda, and J. Montgomery. "Optical coupling techniques to match laser sources to nonlinear crystals." In OSA Annual Meeting. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/oam.1987.wr1.

Full text
Abstract:
New crystals of KTP and beta-barium-borate (BBO) have been recently identified as highly efficient crystals with nonlinear coefficients of 15 and 4.6 times the KDP, respectively. The BBO crystal has the advantages of very wide temperature acceptance width and high damage threshold.1 However, due to the rather large walk-off angle (~50 mrad) of this crystal, a good quality pump is usually required for high conversion efficiency. We present the first direct comparison of the SHG efficiency of a YAG laser (1064 nm) by using KTP, BBO, and CD* A with crystal lengths of 3, 7, and 25 mm, respectively
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hash function SHA-1"

1

Chou, Roger, Rongwei Fu, Tracy Dana, Miranda Pappas, Erica Hart, and Kimberly M. Mauer. Interventional Treatments for Acute and Chronic Pain: Systematic Review. Agency for Healthcare Research and Quality (AHRQ), 2021. http://dx.doi.org/10.23970/ahrqepccer247.

Full text
Abstract:
Objective. To evaluate the benefits and harms of selected interventional procedures for acute and chronic pain that are not currently covered by the Centers for Medicare &amp; Medicaid Services (CMS) but are relevant for and have potential utility for use in the Medicare population, or that are covered by CMS but for which there is important uncertainty or controversy regarding use. Data sources. Electronic databases (Ovid® MEDLINE®, PsycINFO®, the Cochrane Central Register of Controlled Trials, and the Cochrane Database of Systematic Reviews) to April 12, 2021, reference lists, and submission
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Gengbin, Tuo Lin, Manfeng Wu, et al. Effects of repetitive transcranial magnetic stimulation on upper-limb and finger function in stroke patients: a systematic review and meta-analysis of randomized controlled trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.5.0121.

Full text
Abstract:
Review question / Objective: P:Adult patients (age ≥ 18 years) diagnosed with stroke based on relevant clinical examination; I:Intervention group with rTMS alone or in combination with other treatments with rTMS; C:Control group received sham treatment or no rTMS; O: Upper extremity function:the Fugl-Meyer Assessment Upper Extremity (FMA-UE); Hand function:box and block test(BBT), nine-hole peg test(NHPT), and Purdue pegboard test(PPT); S:Randomized controlled trials (rather than crossover designs). Condition being studied: In Europe, more than 1 million new cases of stroke are reported each y
APA, Harvard, Vancouver, ISO, and other styles
3

MacFarlane, Andrew. 2021 medical student essay prize winner - A case of grief. Society for Academic Primary Care, 2021. http://dx.doi.org/10.37361/medstudessay.2021.1.1.

Full text
Abstract:
As a student undertaking a Longitudinal Integrated Clerkship (LIC)1 based in a GP practice in a rural community in the North of Scotland, I have been lucky to be given responsibility and my own clinic lists. Every day I conduct consultations that change my practice: the challenge of clinically applying the theory I have studied, controlling a consultation and efficiently exploring a patient's problems, empathising with and empowering them to play a part in their own care2 – and most difficult I feel – dealing with the vast amount of uncertainty that medicine, and particularly primary care, pre
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!