To see the other types of publications on this topic, follow the link: SHA-1.

Journal articles on the topic 'SHA-1'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'SHA-1.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Hu-ung, Seongjing Lee, Jae-woon Kim, and Youjip Won. "Parallelizing SHA-1." IEICE Electronics Express 12, no. 12 (2015): 20150371. http://dx.doi.org/10.1587/elex.12.20150371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Biham, Eli, Rafi Chen, and Antoine Joux. "Cryptanalysis of SHA-0 and Reduced SHA-1." Journal of Cryptology 28, no. 1 (May 31, 2014): 110–60. http://dx.doi.org/10.1007/s00145-014-9179-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Quilala, Rogel Ladia, Ariel M. Sison, and Ruji P. Medina. "Modified SHA-1 Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 3 (September 1, 2018): 1027. http://dx.doi.org/10.11591/ijeecs.v11.i3.pp1027-1034.

Full text
Abstract:
Hashes are used to check the integrity of data. This paper modified SHA-1 by incorporating mixing method in every round for better diffusion. The modification increased the hash output to 192-bits. Increasing the output increases the strength because breaking the hash takes longer. Based on the different message types, avalanche percentage of modified SHA-1 showed better diffusion at 51.64%, higher than the target 50%, while SHA-1 achieved 46.61%. The average execution time noted for modified SHA-1 is 0.33 seconds while SHA-1 is 0.08 seconds. Time increases as the number of messages hashed increases; the difference is negligible in fewer messages. <a name="_Hlk507405879"></a>On character hits, that is - no same character in the same position, modified SHA-1 achieved lower hit rate because of the mixing method added. The modifications’ effectiveness was also evaluated using a hash test program. After inputting 1000 hashes from random strings, the result shows no duplicate hash.
APA, Harvard, Vancouver, ISO, and other styles
4

Prihensa, Herfin Yienda, and Khafid Ahmad. "Kajian Standar Volume 1 Sha’." Pertemuan dan Presentasi Ilmiah Standardisasi 2019 (December 27, 2019): 195–202. http://dx.doi.org/10.31153/ppis.2019.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Ji-hyun, Heon-seock Cynn, Sil-ah Choi, Tae-lim Yoon, and Hyo-jung Jeong. "Effects of Different Hip Rotations on Gluteus Medius and Tensor Fasciae Latae Muscle Activity During Isometric Side-Lying Hip Abduction." Journal of Sport Rehabilitation 22, no. 4 (November 2013): 301–7. http://dx.doi.org/10.1123/jsr.22.4.301.

Full text
Abstract:
Context:Gluteus medius (Gmed) weakness is associated with some lower-extremity injuries. People with Gmed weakness might compensate by activating the tensor fasciae latae (TFL). Different hip rotations in the transverse plane may affect Gmed and TFL muscle activity during isometric side-lying hip abduction (SHA).Objectives:To compare Gmed and TFL muscle activity and the Gmed:TFL muscle-activity ratio during SHA exercise with 3 different hip rotations.Design:The effects of different hip rotations on Gmed, TFL, and the Gmed:TFL muscle-activity ratio during isometric SHA were analyzed with 1-way, repeated-measures analysis of variance.Setting:University research laboratory.Participants:20 healthy university students were recruited in this study.Interventions:Participants performed isometric SHA: frontal SHA with neutral hip (frontal SHAN), frontal SHA with hip medial rotation (frontal SHA-MR), and frontal SHA with hip lateral rotation (frontal SHA-LR).Main Outcome Measures:Surface electromyography measured the activity of the Gmed and the TFL. A 1-way repeated-measures analysis of variance assessed the statistical significance of Gmed and TFL muscle activity. When there was a significant difference, a Bonferroni adjustment was performed.Results:Frontal SHA-MR showed significantly greater Gmed muscle activation than frontal SHA-N (P = .000) or frontal SHA-LR (P = .015). Frontal SHA-LR showed significantly greater TFL muscle activation than frontal SHA-N (P = .002). Frontal SHA-MR also resulted in a significantly greater Gmed:TFL muscle-activity ratio than frontal SHA-N (P = .004) or frontal SHA-LR (P = .000), and frontal SHA-N was significantly greater than frontal SHA-LR (P = .000).Conclusions:Frontal SHA-MR results in greater Gmed muscle activation and a higher Gmed:TFL muscle ratio.
APA, Harvard, Vancouver, ISO, and other styles
6

Yeh, Yi-Shiung, Ting-Yu Huang, I.-Te Chen, and Shih-Chin Chou. "Analyze SHA-1 in message schedule." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 1 (February 2007): 1–7. http://dx.doi.org/10.1080/09720529.2007.10698105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Michail, Harris E., George S. Athanasiou, Vasileios I. Kelefouras, George Theodoridis, Thanos Stouraitis, and Costas E. Goutis. "Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions’ Pipelined Designs." Journal of Circuits, Systems and Computers 25, no. 04 (February 2, 2016): 1650032. http://dx.doi.org/10.1142/s0218126616500328.

Full text
Abstract:
High-throughput designs of hash functions are strongly demanded due to the need for security in every transmitted packet of worldwide e-transactions. Thus, optimized and non-optimized pipelined architectures have been proposed raising, however, important questions. Which is the optimum number of the pipeline stages? Is it worth to develop optimized designs or could the same results be achieved by increasing only the pipeline stages of the non-optimized designs? The paper answers the above questions studying extensively many pipelined architectures of SHA-1 and SHA-256 hashes, implemented in FPGAs, in terms of throughput/area (T/A) factor. Also, guides for developing efficient security schemes designs are provided.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Eun-Hee, Je-Hoon Lee, Il-Hwan Park, and Kyoung-Rok Cho. "Implementation of high-speed SHA-1 architecture." IEICE Electronics Express 6, no. 16 (2009): 1174–79. http://dx.doi.org/10.1587/elex.6.1174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Quilala, Rogel L., and Theda Flare G. Quilala. "Improved MSHA-1 algorithm with mixing method." Bulletin of Electrical Engineering and Informatics 10, no. 4 (August 1, 2021): 2144–51. http://dx.doi.org/10.11591/eei.v10i4.2366.

Full text
Abstract:
Abstract—Recently, a Modified SHA-1 (MSHA-1) has been proposed and claimed to have better security performance over SHA-1. However, the study showed that MSHA-1 hashing time performance was slower. In this research, an improved version of MSHA-1 was analyzed using avalanche effect and hashing time as performance measure applying 160-bit output and the mixing method to improve the diffusion rate. The diffusion results showed the improvement in the avalanche effect of the improved MSHA-1 algorithm by 51.88%, which is higher than the 50% standard to be considered secured. MSHA-1 attained 50.53% avalanche effect while SHA1 achieved only 47.03% thereby showing that the improved MSHA-1 performed better security performance by having an improvement of 9.00% over the original SHA-1 and 3.00% over MSHA-1. The improvement was also tested using 500 random string for ten trials. The improved MSHA-1 has better hashing time performance as indicated by 31.03% improvement. Hash test program has been used to test the effectiveness of the algorithm by producing 1000 hashes from random input strings and showed zero (0) duplicate hashes.
APA, Harvard, Vancouver, ISO, and other styles
10

Suhaili, Shamsiah binti, and Takahiro Watanabe. "High-Throughput of SHA-256 Hash Function with Unfolding Transformation." Global Journal of Engineering and Technology Review Vol.4 (4) October-December. 2019 4, no. 4 (December 30, 2019): 73–81. http://dx.doi.org/10.35609/gjetr.2019.4.4(1).

Full text
Abstract:
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. This algorithm is important for security applications such as Keyed-Hash Message Authentication Code (HMAC), digital signature, and others. There are different types of hash functions such as MD5, SHA-1, RIPEMD-160, SHA-256, SHA-224, SHA-384, SHA-512, and others. In this paper, the unfolding transformation method was proposed to improve the throughput of the SHA-256 hash function. Three types of SHA-256 hash function were designed namely SHA-256 design, SHA-256 design inner pipelining with unfolding factor 2, and SHA-256 design inner pipelining with unfolding factor 4. The designs were written in Verilog code and the output simulations were verified using ModelSim. The simulation results showed that the proposed SHA-256 inner pipelining unfolding with factor 4 provided the highest throughput which is 4196.30 Mbps, and factor 2 was superior in terms of maximum frequency and was better than the conventional SHA-256 design. Type of Paper: other. Keywords: Cryptography algorithm; FPGA; SHA-256 Hash Function; Unfolding transformation, Verilog
APA, Harvard, Vancouver, ISO, and other styles
11

Michail, Harris E., George S. Athanasiou, George Theodoridis, Andreas Gregoriades, and Costas E. Goutis. "Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures." Microprocessors and Microsystems 45 (September 2016): 227–40. http://dx.doi.org/10.1016/j.micpro.2016.05.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kim, Mooseop, Deok Gyu Lee, and Jaecheol Ryou. "Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing." Personal and Ubiquitous Computing 17, no. 5 (May 11, 2012): 921–32. http://dx.doi.org/10.1007/s00779-012-0543-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

ATHANASIOU, GEORGE S., GEORGE THEODORIDIS, COSTAS E. GOUTIS, HARRIS E. MICHAIL, and TAKIS KASPARIS. "A SYSTEMATIC FLOW FOR DEVELOPING TOTALLY SELF-CHECKING ARCHITECTURES FOR SHA-1 AND SHA-2 CRYPTOGRAPHIC HASH FAMILIES." Journal of Circuits, Systems and Computers 22, no. 06 (July 2013): 1350049. http://dx.doi.org/10.1142/s0218126613500497.

Full text
Abstract:
Hash functions are among the crucial modules of modern hardware cryptographic systems. These systems frequently operate in harsh and noisy environments where permanent and/or transient faults are often causing erroneous authentication results and collapsing of the whole authentication procedure. Hence, their on-time detection is an urgent feature. In this paper, a systematic development flow towards totally self-checking (TSC) architectures of the most widely-used cryptographic hash families, SHA-1 and SHA-2, is proposed. Novel methods and techniques are introduced to determine the appropriate concurrent error detection scheme at high level avoiding gate-level implementations and comparisons. The resulted TSC architectures achieve 100% fault detection of odd erroneous bits, while, depending on the designer's choice, even number of erroneous bits can also be detected. Two representative functions of the above families, namely the SHA-1 and SHA-256, are used as case studies. For each of them, two TSC architectures (one un-optimized and one optimized for throughput) were developed via the proposed flow and implemented in TSMC 0.18 μm CMOS technology. The produced architectures are more efficient in terms of throughput/area than the corresponding duplicated-with-checking ones by 19.5% and 23.8% regarding the un-optimized TSC SHA-1 and SHA-256 and by 20.2% and 24.6% regarding the optimized ones.
APA, Harvard, Vancouver, ISO, and other styles
14

Rao, Siddhartha. "Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity." International Journal of Computer Applications 130, no. 8 (November 17, 2015): 25–27. http://dx.doi.org/10.5120/ijca2015907056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Bahramali, Mohsen, Jin Jiang, and Arash Reyhani-Masoleh. "A Fault Detection Scheme for the FPGA Implementation of SHA-1 and SHA-512 Round Computations." Journal of Electronic Testing 27, no. 4 (August 2011): 517–30. http://dx.doi.org/10.1007/s10836-011-5237-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Nagm, Alhusain, Tetsuyoshi Horiuchi, and Kazuhiro Hongo. "Overcoming Daunting Challenges of Clipping of Paraclinoid Carotid-Ophthalmic and Superior Hypophyseal Artery Aneurysms: 2-Dimensional Operative Video." Operative Neurosurgery 17, no. 6 (March 13, 2019): E252—E253. http://dx.doi.org/10.1093/ons/opz036.

Full text
Abstract:
Abstract This surgical video emphasizes the nuances that needed to overcome daunting challenges of clipping of paraclinoid carotidophthalmic and superior hypophyseal artery (SHA) aneurysms. To avoid hazardous manipulations, scarifying the ipsilateral SHA under visual evoked potential (VEP) guidance can be done without risk of postoperative visual decline. This technique is associated with better visual outcome.1 A 66-yr-old woman presented with gradually enlarging right paraclinoid carotidophthalmic and SHA aneurysms. The relationship between those aneurysms and the critical neurovascular structures made us facing a daunting challenge to preserve the visual function. To preserve the patency of the ophthalmic artery (oph.A), endovascular intervention was abandoned and a direct clipping surgery was selected. Following VEP settings, exposure of the cervical internal carotid artery for proximal control and right frontotemporal craniotomy, a subfrontal approach was used. To get adequate accessibility and safe maneuverability, the anterior clinoidectomy and unroofing of the optic canal were completed, then, the falciform ligament and the distal dural ring were carefully opened. Under VEP guidance, the oph.A and SHAs were temporarily occluded. VEP had been stable under repeated occlusions. The carotidophthalmic aneurysm was clipped with preservation of the oph.A. Besides, 1 ipsilateral SHA was sacrificed to achieve complete clipping of the SHA aneurysm. Final indocyanine green videoangiography confirmed obliteration of the paraclinoid aneurysms and patency of the oph.A, the other SHA and the tiny arterioles around the optic nerve. The postoperative course was uneventful. There was no evidence of postoperative visual disturbances. The patient has consented to the submission of the case report to the journal.
APA, Harvard, Vancouver, ISO, and other styles
17

Roy, Maëva, Lucie Lebeau, Céline Chessa, Alexia Damour, Ali Ladram, Bruno Oury, David Boutolleau, Charles Bodet, and Nicolas Lévêque. "Comparison of Anti-Viral Activity of Frog Skin Anti-Microbial Peptides Temporin-Sha and [K3]SHa to LL-37 and Temporin-Tb against Herpes Simplex Virus Type 1." Viruses 11, no. 1 (January 18, 2019): 77. http://dx.doi.org/10.3390/v11010077.

Full text
Abstract:
Temporins are anti-microbial peptides synthesized in the skin of frogs of the Ranidae family. The few studies to date that have examined their anti-viral properties have shown that they have potential as anti-viral therapies. In this work, we evaluated the anti-herpes simplex virus type 1 (HSV-1) activity of the temporin-SHa (SHa) and its synthetic analog [K3]SHa. Human cathelicidin LL-37 and temporin-Tb (Tb), previously demonstrated to have anti-HSV-1 properties, were used as positive controls. We observed that SHa and [K3]SHa significantly inhibit HSV-1 replication in human primary keratinocytes when used at micromolar concentrations. This anti-viral activity was equivalent to that of Tb, but lower than that of LL-37. Transcriptomic analyses revealed that SHa did not act through the modulation of the cell innate immune response, but rather, displayed virucidal properties by reducing infectious titer of HSV-1 in suspension. In contrast, pre-incubation of the virus with LL-37 suggests that this peptide does not act directly on the viral particle at non-cytotoxic concentrations tested. The anti-HSV-1 activity of LL-37 appears to be due to the potentiation of cellular anti-viral defenses through the induction of interferon stimulated gene expression in infected primary keratinocytes. This study demonstrated that SHa and [K3]SHa, in addition to their previously reported antibacterial and antiparasitic activities, are direct-acting anti-HSV-1 peptides. Importantly, this study extends the little studied anti-viral attributes of frog temporins and offers perspectives for the development of new anti-HSV-1 therapies.
APA, Harvard, Vancouver, ISO, and other styles
18

Long, Sihan. "A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512." Journal of Physics: Conference Series 1314 (October 2019): 012210. http://dx.doi.org/10.1088/1742-6596/1314/1/012210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Pairin, Yusfrizal Bin. "Kode Autentikasi Hash pada Pesan Teks Berbasis Android." Eksplora Informatika 8, no. 1 (September 28, 2018): 6. http://dx.doi.org/10.30864/eksplora.v8i1.129.

Full text
Abstract:
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi. Fungsi Hash merupakan salah satu fungsi yang memberikan layanan untuk verifikasi dan autentikasi karena fungsi ini menghasilkan nilai yang unik untuk setiap masukan. Fungsi Hash disebut juga fungsi satu arah karena sangat sulit untuk mengembalikan ke input awal dengan fungsi Hash. Fungsi Hash dapat digunakan untuk menjaga keutuhan (integritas) data dengan cara membangkitkan message digest dari isi arsip (misalnya dengan menggunakan algoritma MD5). Verifikasi isi arsip dapat dilakukan secara berkala dengan membandingkan message digest dari isi arsip sekarang dengan message digest dari arsip asli. Jika terjadi perbedaan, maka disimpulkan ada modifikasi terhadap isi arsip (atau terhadap message digest yang disimpan). Tetapi bagaimanapun, Hash juga mempunyai kelemahan karena MD5 telah dianggap tidak aman penggunaannya untuk digital signature. Namun, SHA-1 masih dianggap cukup aman. Untuk lebih aman lagi, SHA-256, SHA-384 atau SHA-512 dapat digunakan. Pada aplikasi yang dirancang ini memunculkan nilai Hash yang telah digenerasi dengan berbagai fungsi Hash, meliputi MD5, SHA-1, SHA-256, SHA-384 and SHA-512. Aplikasi ini juga dapat membandingkan persamaan dua pesan teks yang diregenerasi menggunakan SHA-256.
APA, Harvard, Vancouver, ISO, and other styles
20

Fajri, Khairul, Lili Tanti, and Rofiqoh Dewi. "Aplikasi Verifikasi Ijazah Menggunakan Digital Signature Metode SHA-1." IT (INFORMATIC TECHNIQUE) JOURNAL 5, no. 2 (May 24, 2018): 128. http://dx.doi.org/10.22303/it.5.2.2017.128-138.

Full text
Abstract:
<p class="Normal1"><em>Melamar pekerjaan dan mengejar jabatan penting di pemerintahan. Selain dari segi kemampuan seseorang di dalam posisi yang hendak ia raih, latar belakang pendidikan seseorang merupakan salah satu faktor penunjang kesuksesan orang yang bersangkutan untuk meraih posisi yang diharapkan. Untuk mengetahui latar belakang pendidikan seseorang, mayoritas negara di dunia khusus nya Indonesia yaitu dengan ijazah. Pada saat sekarang ini untuk mengetahui keaslian suatu dokumen yaitu dengan cara verifikasi, Namun didalam verifikasi tersebut harus memiliki keamanan yang baik untuk mengatasi pemalsuan dan modifikasi. Untuk membuat ijazah yang memiliki keamanan yang baik, tentunya dapat menggunakan verifikasi dengan digital signature.</em><em> </em><em>Selain metode enkripsi-dekripsi, di dalam ilmu kriptografi juga terdapat metode untuk melakukan otentikasi terhadap suatu pesan. Secara sederhana, otentikasi merupakan cara utntuk memastikan bahwa pesan yang diterima oleh si penerima pesan adalah tepat sama dengan pesan yang dikirim oleh pengirim pesan pesan tersebut. Lebih jauh lagi, otentikasi juga dapat digunkan untuk memastikan indentitas pengirim. pada penelitian ini penulis akan meneliti mengenai metode enkripsi membuat digital signature untuk memberikan metode proteksi maksimum untuk keabsahan digital signature. Adapun metode pembuatan digital signature yang dirancang pada aplikasi verifikasi ijazah yaitu dengan menggunkan algoritma SHA-1.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
21

Jasek, Roman. "SHA-1 and MD5 Cryptographic Hash Functions: Security Overview." Communications - Scientific letters of the University of Zilina 17, no. 1 (February 28, 2015): 73–80. http://dx.doi.org/10.26552/com.c.2015.1.73-80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Malik Arman Morshidi, Roohie Naaz Mir, Miss Laiha Binti Mat Kiah, and Abdul Mobeen Khan. "EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY." Malaysian Journal of Computer Science 35, no. 3 (July 27, 2022): 179–200. http://dx.doi.org/10.22452/mjcs.vol35no3.1.

Full text
Abstract:
With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and interconnected communications. Cryptographic hash functions have been extensively employed to ensure data integrity in insecure environments. Hash functions are also combined with digital signatures to offer identity verification mechanisms and non-repudiation services. The federal organization National Institute of Standards and Technology (NIST) established the SHA to provide security and optimal performance over some time. The most well-known hashing standards are SHA-1, SHA-2, and SHA-3. This paper discusses the background of hashing, followed by elaborating on the evolution of the SHA family. The main goal is to present a comparative analysis of these hashing standards and focus on their security strength, performance and limitations against common attacks. The complete assessment was carried out using statistical analysis, performance analysis and extensive fault analysis over a defined test environment. The study outcome showcases the issues of SHA-1 besides exploring the security benefits of all the dominant variants of SHA-2 and SHA-3. The study also concludes that SHA-3 is the best option to mitigate novice intruders while allowing better performance cost-effectively.
APA, Harvard, Vancouver, ISO, and other styles
23

M. Nasution, Rezky. "Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio." Bulletin of Computer Science Research 2, no. 3 (August 31, 2022): 73–84. http://dx.doi.org/10.47065/bulletincsr.v2i3.140.

Full text
Abstract:
Audio file is a means of information from one person to another. Audio files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of audio files, this can be done by using cryptographic techniques. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA stands for Secure Hash Algorithm is a standard hash function published by NIST (National Institute of Standards and Technology). SHA is published with a digest size of 512 bits. SHA-1 will output 160 bits of the string and the output string is called a message digest. The length of the message digest can range from 160 to 512 bits depending on the algorithm. This study describes the security process for detecting the authenticity of audio files using the SHA-1 method in the form of detection so that confidential audio sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of audio files.
APA, Harvard, Vancouver, ISO, and other styles
24

Shen, Quanjun, Liang Fan, Yaohui Yang, Hui Wei, Haifeng Xu, Anzhen Cao, and Yan Zhang. "Study on high temperature performance of coal based modified asphalt mixture." Advances in Engineering Technology Research 1, no. 3 (February 2, 2023): 834. http://dx.doi.org/10.56028/aetr.3.1.834.

Full text
Abstract:
SHA, as a solid waste from direct coal liquefaction, has a certain application prospect. Based on the original concept and process of coal based clean asphalt preparation, this paper studies the performance of SHA coal based modified asphalt mixture, and draws the following conclusions: (1) SHA modified asphalt has the characteristics of hard asphalt (2) Compared with traditional SBS modified asphalt mixture, SHA modified asphalt mixture has good high temperature performance (3) SHA modified asphalt mixture has small rutting rolling depth, which can improve the rutting resistance of asphalt pavement.
APA, Harvard, Vancouver, ISO, and other styles
25

Velazhahan, Rethinasamy, Shima Nasser Hamed Al-Mamari, Abdullah Mohammed Al-Sadi, Issa Hashil Al-Mahmooli, and S. P. Sathish Babu. "In vitro antagonistic potential, plant growth-promoting activity and indole-3-acetic acid producing trait of bacterial isolates from spent mushroom substrate of Agaricus bisporus." Journal of Agricultural and Marine Sciences [JAMS] 25, no. 2 (September 20, 2020): 22. http://dx.doi.org/10.24200/jams.vol25iss2pp22-29.

Full text
Abstract:
Spent mushroom substrate (SMS) is widely used as fertilizer and to control plant diseases. The microorganisms surviving in SMS play a crucial role in plant growth promotion and biocontrol properties of SMS. In this study, an effort was made to isolate and characterize the bacterial species present in the SMS of Agaricus bisporus and to study their antagonistic potential, plant growth-promoting ability and indole-3-acetic acid (IAA) producing trait. Six different bacterial isolates exhibiting morphological variabilities were obtained from the SMS by serial dilution technique. On the basis of 16S rRNA gene sequences, these isolates were identified as Staphylococcus epidermidis (Sh1 and Sh3), S. aureus (Sh2), Bacillus albus (Sh4), Delftia lacustris (Sh6) and Comamonas aquatica (Sh7). These bacterial strains were assayed for their antagonism against Pythium aphanidermatum, a phytopathogenic oomycete. The results of in vitro dual culture assay revealed that all the 6 bacterial isolates showed low levels of suppression of P. aphanidermatum and recorded less than 5 mm inhibition zone. Among the bacterial isolates, S. epidermidis Sh3 recorded the maximum inhibition zone of 4.2 mm. Plant growth promotion test using roll paper towel method revealed that C. aquatica Sh7, B. albus Sh4, D. lacustris Sh6 and S. epidermidis Sh3 caused a significant increase in seedling vigour of cucumber compared to control. The seeds treated with the bacterial isolate C. aquatica Sh7 showed the maximum seedling vigor. Assessment of in vitro production of IAA by the bacterial isolates revealed that the bacterial isolates highly varied (ranging from 0.28 to 9.25 mg L-1) in their potential for production of IAA. The maximum amount of IAA was produced by C. aquatica Sh7 (9.25 mg L-1), while the minimum was produced by S. epidermidis Sh1 (0.28 mg L-1).
APA, Harvard, Vancouver, ISO, and other styles
26

Ali Al-Hammadi, Yousef, and Mohamed Fadl Idris Fadl. "Reducing Hash Function Complexity: MD5 and SHA-1 as Examples." International Journal of Mathematical Sciences and Computing 5, no. 1 (January 8, 2019): 1–17. http://dx.doi.org/10.5815/ijmsc.2019.01.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

LEE, Je-Hoon, Sang-Choon KIM, and Young-Jun SONG. "High-Speed FPGA Implementation of the SHA-1 Hash Function." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 9 (2011): 1873–76. http://dx.doi.org/10.1587/transfun.e94.a.1873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tang, YuChen, Guang Zeng, and WenBao Han. "Classification of disturbance vectors for collision attack in SHA-1." Science China Information Sciences 58, no. 11 (May 4, 2015): 1–10. http://dx.doi.org/10.1007/s11432-015-5280-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Visconti, Andrea, and Federico Gorla. "Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2." IEEE Transactions on Dependable and Secure Computing 17, no. 4 (July 1, 2020): 775–81. http://dx.doi.org/10.1109/tdsc.2018.2878697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Timofeev, Eugene V., Eduard G. Malev, and Eduard V. Zemtsovsky. "Small heart anomalies as cardiac manifestations of hereditary connective tissue disorders." Pediatrician (St. Petersburg) 11, no. 5 (December 30, 2020): 5–12. http://dx.doi.org/10.17816/ped1155-12.

Full text
Abstract:
Introduction. Small heart anomalies (SHA) are the morphological basis for functional changes in cardiac activity and can exacerbate the course of organic heart lesions. The most studied SHA include false chords of the left ventricle (FCLV) and mitral valve prolapse. Prevalence, association with external signs of dysembryogenesis, as well as the predictive value of SHA are not sufficiently studied. Materials and methods. We examined 611 people between the ages of 18 and 23 (average age 20.3 1.6 years), including 257 boys and 354 girls. All of the surveyed performed phenotypic, anthropometric and echocardiographic examinations. To identify the SHA links to heart rhythm disorders, the 205 surveyed performed Holters ECG monitoring. Results. SHA identified in 90% of the individuals surveyed: atrial septum aneurysm (24%), tricuspid valve prolapse (23.4%), asymmetry of the aortic valve (20.6%), additional papillary muscles (39.4%) and FCLV (75,1%). Correlation analysis showed the presence of links between these SHA and bone signs of dysembryogenesis (chest deformities, arachnodactyllia, dolistennomely and high palate), as well as heart rhythm disorders (supraventricular and ventricular extrasystoles, rhythm driver migration and episodes of AV-blockade 1 degree). Patients with marfanoid habitus have a higher average number of SHA (2.1 1.4 vs 0.9 0.7, p 0.005). Conclusions. SHA are identified in the vast majority of healthy people. Bone signs of dysembryogenesis are associated with significant SHA and can serve as a marker for the involvement of the heart in the dysplastic process. Patients with SHA have significant cardiac arrhythmias.
APA, Harvard, Vancouver, ISO, and other styles
31

Korona, Mateusz, Paweł Szumełda, Mariusz Rawski, and Artur Janicki. "Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe." Electronics 11, no. 11 (May 25, 2022): 1688. http://dx.doi.org/10.3390/electronics11111688.

Full text
Abstract:
In this article we address the problem of efficient and secure monitoring of computer network traffic. We proposed, implemented, and tested a hardware-accelerated implementation of a network probe, using the DE5-Net FPGA development platform. We showed that even when using a cryptographic SHA-3 hash function, the probe uses less than 17% of the available FPGA resources, offering a throughput of over 20 Gbit/s. We have also researched the problem of choosing an optimal hash function to be used in a network probe for addressing network flows in a flow cache. In our work we compared five 32-bit hash functions, including two cryptographic ones: SHA-1 and SHA-3. We ran a series of experiments with various hash functions, using traffic replayed from the CICIDS 2017 dataset. We showed that SHA-1 and SHA-3 provide flow distributions as uniform as the ones offered by the modified Vermont hash function proposed in 2008 (i.e., with low means and standard deviations of the bucket occupation), yet assuring higher security against potential attacks on a network probe.
APA, Harvard, Vancouver, ISO, and other styles
32

Zhu, Jing Ping, Shi Du, and Xian Li. "Detection of microcystin-producingMicrocystisin Guanqiao Lake using a sandwich hybridization assay." Canadian Journal of Microbiology 58, no. 4 (April 2012): 442–47. http://dx.doi.org/10.1139/w2012-008.

Full text
Abstract:
Based on sequence analyses of the mcyJ gene from Microcystis strains, a probe pair TJF and TJR was designed and a sandwich hybridization assay (SHA) was established to quantitatively detect microcystin-producing Microcystis. Through BLAST and cyanobacterial culture tests, TJF and TJR were demonstrated to be specific for microcystin-producing Microcystis. A calibration curve for the SHA was established, and the lowest detected concentration was 100 cells·mL–1. Laboratory cultures and field samples from Guanqiao Lake were analyzed with both the SHA and microscopy. The cell number of microcystin-producing Microcystis and that of total Microcystis were compared. The biotic and abiotic components of the samples were of little disturbance to the SHA. In this study, a SHA was established to detect Microcystis, providing an alternative to PCR–ELISA and real-time PCR technology.
APA, Harvard, Vancouver, ISO, and other styles
33

Sobti, Rajeev, and Geetha Ganesan. "Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor." International Journal of Information Security and Privacy 12, no. 1 (January 2018): 63–73. http://dx.doi.org/10.4018/ijisp.2018010106.

Full text
Abstract:
SHA-3 was an open competition initiated by NIST to design new generation of hash functions. This competition was a necessity to overcome the challenges imposed by multiple attacks on MDx family of hash functions including SHA-0 and SHA-1. For this competition, NIST announced a reference platform which did not cover Embedded and Mobile machines. This paper compares the performance of SHA-3 final round candidate algorithms on ARM Cortex-M4 processor (embedded processor) and presents the results. Cycles per Byte is used as performance metric. Cortex-M4 based Stellaris® LM4F232 Evaluation Board (EK-LM4F232) from Texas Instruments is used for performance evaluation.
APA, Harvard, Vancouver, ISO, and other styles
34

Horiuchi, Tetsuyoshi, Tetsuya Goto, Yuichiro Tanaka, Kunihiko Kodama, Keiji Tsutsumi, Kiyoshi Ito, and Kazuhiro Hongo. "Role of superior hypophyseal artery in visual function impairment after paraclinoid carotid artery aneurysm surgery." Journal of Neurosurgery 123, no. 2 (August 2015): 460–66. http://dx.doi.org/10.3171/2014.12.jns141218.

Full text
Abstract:
OBJECT Although a number of studies have assessed the surgical treatment of paraclinoid-segment carotid artery aneurysms and resulting visual complications, less attention has been given to the results with respect to the superior hypophyseal artery (SHA). The authors evaluated the relationship between the aneurysm, the SHA itself, and postoperative visual function in patients with ruptured and unruptured SHA aneurysms. METHODS From January 1991 through December 2013, 181 patients with 190 paraclinoid carotid artery aneurysms received treatment at Shinshu University Hospital and its affiliated hospitals. The authors retrospectively analyzed charts, operative records, operative videos, and neuroimaging findings for these patients with or without postoperative visual complications. RESULTS The authors identified 72 SHA aneurysms in 70 patients (mean age 58 years). Of 69 patients (1 patient died) evaluated, postoperative visual complications occurred in 9 (13.0%). Although the aneurysm size and SHA sacrifice did not lead to postoperative visual impairment, simultaneous treatment of bilateral aneurysms was a risk factor for postoperative visual complications. CONCLUSIONS Unilateral SHA impairment may be safe (i.e., it may not induce ischemia of the optic pathway) for many, but not all, patients with SHA aneurysm.
APA, Harvard, Vancouver, ISO, and other styles
35

Morosanova, Maria A., Vitaliy A. Kovalev, and Elena I. Morosanova. "Silica Xerogel Doped with Iron(III) as Sensor Material for Salicylhydroxamic Acid Determination in Urine." Gels 7, no. 3 (September 16, 2021): 143. http://dx.doi.org/10.3390/gels7030143.

Full text
Abstract:
Salicylhydroxamic acid (SHA) is used as antimicrobic medicine and its concentration has to be monitored in urine. For the first time, silica xerogels doped with iron(III) have been proposed as sensor materials for SHA determination in biological samples. Three xerogels with iron(III) content in the range of 0.04–1.74% wt have been synthesized. BET surface area of these xerogels has varied in the range of 696–529 m2/g and total pore volume has varied in the range of 0.92–0.23 cm3/g. Complex formation between immobilized iron(III) and salicylhydroxamic acid has been investigated with solid phase spectrophotometry and IR spectroscopy. Orange-brown iron(III)-SHA complex with 1:1 stoichiometry is formed at pH 1–4 with half-reaction time of 17 min. Silica xerogel doped with 0.33% wt iron(III)) has been used as sensor material for SHA solid phase spectrophotometric determination (LOD 1.4 mg/L (n = 3), analytical range 4–230 mg/L). Proposed sensor material has been applied for SHA determination in biological samples of synthetic and human urine. The proposed procedure is characterized by a good level of accuracy (recovery values 97–120%) and precision (RSD values 4–9%) and can be recommended for pharmacokinetic–pharmacodynamic studies of hydroxamic acid-based medications.
APA, Harvard, Vancouver, ISO, and other styles
36

Romão, Luciane Pimenta Cruz, Adriana Barbosa Araújo, André Henrique Rosa, and Julio Cesar Rocha. "Redução de crômio hexavalente por substâncias húmicas aquáticas imobilizadas em aminopropil sílica." Eclética Química 27, spe (2002): 383–91. http://dx.doi.org/10.1590/s0100-46702002000200031.

Full text
Abstract:
Estudou-se a redução de Cr(VI) à Cr(III) utilizando-se um novo suporte preparado pela ativação de aminopropil sílica com substâncias húmicas aquáticas (ATPS-SiO2-SHA). Coletaram-se amostras de água no Corrégo Itapitangui localizado no município de Cananéia-SP e extraíram-se as SHA utilizando-se procedimento recomendado pela Sociedade Internacional de Substâncias Húmicas. Após purificação por diálise, fez-se a imobilização das SHA na aminopropil sílica (APTS-SiO2) em pH 7,0, sob agitação mecânica por 48 horas à temperatura ambiente. Adicionaram-se 150 mg de APTS-SiO2-SHA à 150 mL de soluções 9,5 mimol L-1 de Cr(VI), fixou-se o pH em 2,5, 4,5 e 6,0 e mantiveram-se as misturas sob agitação mecânica à temperatura ambiente. Coletaram-se alíquotas em função do tempo (0-72 horas) e as concentrações de Cr(VI) foram determinadas por espectrofotometria baseada na reação com 1,5-difenilcarbazida. A porcentagem de redução de Cr(VI) por APTS-SiO2-SHA foi de 50, 4 e 0 % em pH 2,5, 4,5 e 6,0, respectivamente. Dobrando a massa do suporte APTS-SiO2-SHA verificou-se em pH 2,5, a redução de 70 % de Cr(VI). Esses resultados preliminares mostram forte influência do pH e da quantidade de APTS-SiO2-SHA no processo de redução do Cr(VI). Após outros estudos, a utilização do suporte APTS-SiO2-SHA pode ser uma alternativa viável a ser aplicada para o tratamento de resíduos e/ou estudos de especiação de crômio.
APA, Harvard, Vancouver, ISO, and other styles
37

Nainggolan, Sopiana. "Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner." Resolusi : Rekayasa Teknik Informatika dan Informasi 2, no. 5 (May 25, 2022): 201–13. http://dx.doi.org/10.30865/resolusi.v2i5.368.

Full text
Abstract:
On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new. The selection of the SHA-256 algorithm is inseparable from several previous studies that have examined the performance of this algorithm. The SHA-256 algorithm is able to detect changes that occur in digital images even though the changes that occur are only 1 pixel, the small differences that occur in the image produce a very significant difference from the hash value with an accuracy level of up to 100%. SHA - 256 produces a message digest with 256 bits in length. SHA - 256 is classified as safe because it is designed in such a way that it is not possible to get messages related to the same message digest.
APA, Harvard, Vancouver, ISO, and other styles
38

Spinsante, Susanna, and Ennio Gambi. "DSA with SHA-1 for Space Telecommand Authentication: Analysis and Results." Journal of Communications Software and Systems 5, no. 1 (March 22, 2009): 26. http://dx.doi.org/10.24138/jcomss.v5i1.212.

Full text
Abstract:
The issue of securing Telecommand data communications in civil and commercial space missions, by means of properly located security services and primitives, has been debated within the Security Working Group of the ConsultativeCommittee for Space Data Systems since several months. In the context of Telecommand transmissions, that can be vital in determining a successful operational behavior of a space system, the interest is mainly focused on authentication, more than encryption. The object of this paper is to investigate, under the perspective of computational overhead, the possible applicability of a standard scheme, Digital Signature Algorithm with SHA-1, to the authentication of Telecommand data structures, andto discuss the pros and cons related to its adoption in such a peculiar context, through numerical simulations and comparison with an alternative solution relying on the widely used MD5 hash algorithm.
APA, Harvard, Vancouver, ISO, and other styles
39

Kim, Minchul, Younghoon Jung, and Junghwan Song. "A modified exhaustive search on a password system using SHA-1." International Journal of Information Security 16, no. 3 (June 20, 2016): 263–69. http://dx.doi.org/10.1007/s10207-016-0332-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Quilala, Rogel Ladia, and Theda Flare Ginoy Quilala. "Document verification using quick response code with modified secure hash algorithm-1 and modified blowfish algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (October 1, 2022): 470. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp470-479.

Full text
Abstract:
A previous study has been conducted integrating modification on secure hash algorithm 1 (SHA-1) to document integrity verification of printed documents using quick response (QR) codes. However, encryption is warranted as data is transmitted in plaintext directly to the server to prevent hacking and ensuring not only data integrity but data security as well. A more secured document integrity verification using QR code was designed and developed by successfully incorporating a better hashing algorithm– modified SHA-1 and integrating a modern encryption algorithm–modified blowfish algorithm. By integrating both, data integrity and data confidentiality is assured as compared to previous research. The developed software was checked against user requirements to check the acceptability of the software. Error rate and accuracy were also checked to see how the software performed. Based on the testing conducted, it has been found that the document integrity verification software using QR code with the integration of modified SHA-1 hash and Modified Blowfish encryption was acceptable, accurate, and more secure.
APA, Harvard, Vancouver, ISO, and other styles
41

Kumar, Umesh, and V. Ch Venkaiah. "An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–27. http://dx.doi.org/10.4018/ijcac.308275.

Full text
Abstract:
Cryptographic hash functions and HMACs are used to achieve various security goals such as message integrity, message authentication, digital signatures, and entity authentication. This article proposes (1) a new hash function (QGMD5-384) and (2) an efficient message authentication code (QGMAC-384) based on a quasigroup. A quasigroup is a non-associative algebraic structure and its number grows exponentially with its order. Note that the existing hash functions and HMACs that use quasigroups are vulnerable to prefix and suffix attacks. The security of the proposed hash function is analyzed by comparing it with the MD5 and SHA-384. It is found that the proposed QGMD5-384 is more secure. Also, QGMAC-384 is analyzed against brute force and forgery attacks and it is found to be resistant to these attacks. The performance of the new schemes is compared with their counterparts, such as SHA-384 and HMAC-SHA-384. It is observed that QGMD5-384 and QGMAC-384 are slightly slower than MD5 and HMAC-MD5, respectively, but faster than both the SHA-384 and the HMAC-SHA-384.
APA, Harvard, Vancouver, ISO, and other styles
42

Aslam, Imran, Irina Perjar, Xiaoyan A. Shi, Jordan B. Renner, Virginia B. Kraus, Yvonne M. Golightly, Joanne M. Jordan, and Amanda E. Nelson. "Associations Between Biomarkers of Joint Metabolism, Hand Osteoarthritis, and Hand Pain and Function: The Johnston County Osteoarthritis Project." Journal of Rheumatology 41, no. 5 (March 1, 2014): 938–44. http://dx.doi.org/10.3899/jrheum.130904.

Full text
Abstract:
Objective.To determine the associations between joint metabolism biomarkers and hand radiographic osteoarthritis [(rOA), based on Kellgren Lawrence (KL) grade ≥ 2], symptoms, and function.Methods.Cross-sectional data were available for 663 participants (mean age 63 yrs, 63% white, 49% women). Three definitions of hand rOA were considered: (1) a composite measure involving at least 3 hand joints distributed bilaterally with 2 of 3 in the same joint group, including ≥ 1 distal interphalangeal joint, without metacarpophalangeal (MCP) swelling; (2) rOA in at least 1 joint of a group; and (3) number of joints with KL ≥ 2. We assessed hand symptoms and the 15-item Australian Canadian Hand Osteoarthritis Index (AUSCAN; Likert format). We measured serum cartilage oligomeric matrix protein (sCOMP), hyaluronic acid (sHA), carboxy-terminal propeptide of type II collagen, type II collagen degradation product, urinary C-terminal crosslinked telopeptide of type II collagen, and urinary N-terminal crosslinked telopeptide. Linear regression models were performed to assess associations between each biomarker with hand rOA, AUSCAN, and symptoms, adjusting for age, sex, race, current smoking/drinking status, body mass index, and hip and knee rOA.Results.In adjusted analyses, MCP (p < 0.0001) and carpometacarpal rOA (p = 0.003), and a higher number of hand joints with rOA (p = 0.009), were associated with higher levels of sHA. Positive associations were seen between AUSCAN and hand symptoms and levels of sCOMP (p ≤ 0.003) and sHA (p ≤ 0.048).Conclusion.Hand symptoms and higher AUSCAN scores were independently associated with higher levels of both sCOMP and sHA; hand rOA was associated only with sHA levels.
APA, Harvard, Vancouver, ISO, and other styles
43

Oyane, Ayako, Ikuko Sakamaki, Yoshiki Shimizu, Kenji Kawaguchi, Yu Sogo, Atsuo Ito, and Naoto Koshizaki. "Laser-Assisted Biomimetic Process for Calcium Phosphate Coating on a Hydroxyapatite Ceramic." Key Engineering Materials 529-530 (November 2012): 217–22. http://dx.doi.org/10.4028/www.scientific.net/kem.529-530.217.

Full text
Abstract:
The present authors recently developed a new calcium phosphate (CaP) coating technique on an ethylene-vinyl alcohol copolymer substrate utilizing a laser-assisted biomimetic (LAB) process. In the present study, the LAB process was applied to a sintered hydroxyapatite (sHA) substrate for CaP coating. The LAB process was carried out by irradiating the sHA substrate immersed in a supersaturated CaP solution with a low-energy Nd-YAG pulsed laser. Within 30 min of irradiation, contiuous CaP layers with different morphologies were successfully formed on the laser-irradiated sHA surface. A submicron cavernous structure of the CaP layer was developed into a micron flake-like structure as the laser power increased from 1 to 3 W. This result suggests that the secondary nucleation and growth of CaP crystals were accelerated by laser irradiation in a power-dependent manner. Laser absorption by the sHA substrate and the resulting increase in ambient temperature locally near the surface should be responsible for the accelerated CaP nucleation and growth. The present CaP coating technique using the LAB process is simple and quick, hence it would be useful in orthopedic and dental applications as an on-demand surface-functionalization method for biomaterials consisting of sHA.
APA, Harvard, Vancouver, ISO, and other styles
44

Toruan, Dermawan Lumban. "Implementasi Metode Secure Hash Algorithm-1 Untuk Mendeteksi Keaslian File Dokumen." Journal of Information System Research (JOSH) 2, no. 4 (July 24, 2021): 227–34. http://dx.doi.org/10.47065/josh.v2i4.568.

Full text
Abstract:
Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.
APA, Harvard, Vancouver, ISO, and other styles
45

Tiwari, Harshvardhan, and Krishna Asawa. "Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm." Journal of Computing and Information Technology 21, no. 4 (2013): 223. http://dx.doi.org/10.2498/cit.1002181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Silalahi, Lisnayani, and Anita Sindar. "Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 3, no. 2 (October 21, 2020): 182–86. http://dx.doi.org/10.32672/jnkti.v3i2.2413.

Full text
Abstract:
Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.
APA, Harvard, Vancouver, ISO, and other styles
47

Manuel, Stéphane. "Classification and generation of disturbance vectors for collision attacks against SHA-1." Designs, Codes and Cryptography 59, no. 1-3 (January 5, 2011): 247–63. http://dx.doi.org/10.1007/s10623-010-9458-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Taku, K. J., and Y. D. Amartey. "Suitability study of soybeans husk ash as a mixing material to OPC: Effect of calcination time-preliminary investigation." Kathmandu University Journal of Science, Engineering and Technology 12, no. 1 (November 12, 2018): 13–22. http://dx.doi.org/10.3126/kuset.v12i1.21561.

Full text
Abstract:
Soybeans husk was collected from a dump site, dried de-carbonated, separated into six samples and calcined at a temperature of 600 °C, for 1, 2, 3, 4, 5 and 6 hours respectively. Samples were taken for X- ray Florescence (XRF) analysis, Standard Electron Microscopy (SEM) imaging, setting time, standard water of consistency determination and specific gravity test. The result of XRF analysis revealed that the SHA contain less than 70 % SiO2+Al2O3+Fe2O3 stipulated by ASTM C618 for pozzolanas, but has very high CaO content. The SiO2 +Al2O3+Fe2O3 and CaO content though varies slightly with the calcination time of soybean husk. The specific gravity of SHA varies with calcination time of SH and ranges between 2.3 and 2.7 and is less than that of OPC irrespective of the calcination time. Setting times of OPC/SHA pastes at 10 % replacement of OPC with SHA increases with calcination time and is greater than that for OPC paste. The SEM analysis shows that the crystal structure of the SHA changes with calcination temperature. The compressive strength of mortar using OPC/SHA as a binder was determined after 7, 14 and 28 days curing and was found to be less than that for OPC mortars at all ages. However, the percentage reduction in strength decreased with curing age, with SHA calcined at 4 hours having the greater strength (i.e. 87.4 % of OPC strength at 28 days). The percentage gain in strength was more pronounced from 7 to 14 days. In all, SH calcined at 600 °C for 4 hours optimizes the pozzolanic potential of SHA.Kathmandu University Journal of Science, Engineering and Technology Vol. 12, No. I, June, 2016, Page: 13-22
APA, Harvard, Vancouver, ISO, and other styles
49

Chitlur, Meera B., Indira Warrier, Madhvi Rajpurkar, Wendy Hollon, Lolita Llanto, and Jeanne M. Lusher. "Thromboelastography in Children with Coagulation Factor Deficiencies." Blood 106, no. 11 (November 16, 2005): 2139. http://dx.doi.org/10.1182/blood.v106.11.2139.2139.

Full text
Abstract:
Abstract The thromboelastograph produces a continuous profile of the rheological changes that occur during the process of coagulation using whole blood. This information can be transformed into a dynamic velocity profile of the changes in blood elasticity occurring during clotting. We used the TEG® hemostasis analyzer in patients with hemophilia A or B with and without inhibitors and other coagulation factor deficiencies (OFD), to study the thromboelastographic profiles in these patients. Materials and Methods: 62 children (6 months-19 years old) were enrolled according to IRB regulations. 29 children had severe hemophilia A (SHA), 4 moderate hemophilia A or B (Mod.H), 2 severe factor VII deficiency, 1 combined factor V and VIII deficiency, 1 VWD (type II B), 1 severe factor V deficiency, 1 Severe PAI deficiency, 19 normal controls (NC), and 4 SHA with inhibitors (SHA+I). All patients were studied 72 hours after the last dose of factor. Citrated whole blood was activated using recombinant human tissue factor (Innovin, Dade Behring Inc®) and recalcified using 0.2M CaCl2. In patients with central lines with heparin, a heparinase cup was used. The TEG® was run for ≥ 90 min. CBC with differential was obtained on all subjects. Results: There was no significant difference in the CBC parameters among patients. Analysis of the TEG data revealed the following: Table 1 TEG Parameters (mean values) SHA (n=29) Mod.H (n=4) SHA+I (n=4) OFD (n=6) Control(n=19) MTG:Max rate of thrombin generation; TMG: Time to MTG; R: Reaction Time; K: Time to reach an amplitude of 20mm; MA: Max. Amplitude MTG(mm*100/sec) 8.7 9.6 1.3 9 17 TMG(min) 27.5 16.6 62.7 17.5 8.9 R(min) 22 14 56 15 7 K(min) 7 4 41 4 2 Max.Amplitude, MA (mm) 59 56 12 58 62 The rate of thrombin generation as visualized by plotting the 1st derivative of the TEG course, in patients with SHA without inhibitors, showed that they could be divided into 2 groups based on MTG (</>9). When analysed the 2 groups showed the following characteristics (5 representative curves from each group are shown): Figure Figure Table 2 TEG Parameters (Mean values) MTG < 9 (n=16) MTG > 9 (n=13) p value TMA: Time to MA; MTG(mm*100/sec) 5.5 12.6 <0.001 TMG (min) 33 20 0.009 R(min) 26 16 0.004 K(min) 9 3.4 0.03 MA(mm) 56.1 62.3 0.01 TMA(min) 60 38 0.006 13/29 children with SHA had target joints and 69%of patients with target joints had a MTG<9. Conclusions: SHA patients have variable bleeding tendencies as seen by the variation in MTG. A lower MTG is associated with a higher incidence of target joints. This may provide a clue as to which patients may have the greatest benefit from primary prophylaxis. Patients with OFD have a TEG® profile similar to Mod.H patients. SHA+I have poor thrombin generation as seen by a significantly longer TMG and R time (p <0.05), compared to all subjects. The TEG may provide valuable clues to the severity of bleeding tendencies in patients with factor deficiencies. In additional observations (not shown), it appears that the TEG may be used to monitor the response to treatment with factor concentrates and tailor treatment with rFVIIa.
APA, Harvard, Vancouver, ISO, and other styles
50

Alim, Muhammad Nurul. "The Analysis of Minimum Distribution to Each Mustahiq and Its Relevance to Zakat al-Fitr Obligation to All Muslims." WARAQAT : Jurnal Ilmu-Ilmu Keislaman 7, no. 2 (December 30, 2022): 220–38. http://dx.doi.org/10.51590/waraqat.v7i2.385.

Full text
Abstract:
This study aims to analyze the minimum needs of Zakat al-Fitr distributed to Mustahiq so they do not beg on Eid al-Fitr and can pay Zakat al-fitr. Being Muslims, fuqaraa and masakeen as priority recipients of Zakat al-Fitr are also obliged to pay Zakat for themselves. This study employs exploratory and normative legal research methodology that examines the library’s source as legal material that becomes a means of analysis. The finding result of this study suggests that the minimum need of Zakat al-Fitr distributed to each recipient is 2 sha of which 1 sha to Eid al-Fitr food and the other one sha to be repaid as their Zakat al-fitr. If Zakat al-Fitr is distributed in the form of money, then the distributed amount is equivalent to the price of 2 sha of local staple food. Sociological impact of such distribution is that all Muslims in areas where Zakat al-Fitr is collected can pay Zakat. The practical implication of this study is to distribute Zakat al-Fitr to each recipient as much as 2 sha and to raise the recipients' awareness of their obligation to pay Zakat al-Fitr for themselves and their dependents from the staple food or money they received.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography