-
1
-
2
Analysis of cryptographic hash functions
Published 2011“…We also improved the meet-in-the-middle preimage attacks, one of the most powerful techniques for breaking one-wayness of many functions, and applied these techniques to SHA-2, Tiger, MD4, and HAVAL to find preimages. All these techniques await for further development and applications to other hash functions including the candidates in current SHA-3 competition.…”
Get full text
Thesis -
3
Comparing the efficacy ultrasound guided bilateral transversus abdominis plane (TAP) block between 0.25% bupivacaine versus 0.125% bupivacaine in laparoscopic appendicectomy
Published 2017“…The total PCA fentanyl requirement between both groups were insignificant (132.95mcg vs 128.64mcg) (MD:4.32, p value = 0.73). No complication arises from TAP block. …”
Get full text
Thesis -
4
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Popular hash functions are Message Digest 4/5 (MD-4/5), Secure Hashing Algorithm (SHA-0/1) and RIPEMD, which are referred to as MDx-class hash functions due to some commonalities in their design with the MD-family. …”
Get full text
Thesis