Results 91 to 100 of about 9,006 (193)

Fusion of isolated myoblast plasma membranes [PDF]

open access: yes, 1978
Fusion of plasma membranes isolated from myoblasts grown in culture has been investigated. 1. 1. Membrane fusion was specifically dependent on Ca2+ at physiological concentrations. However, at higher concentrations of cations, fusion could be triggered
Ahkong   +59 more
core   +1 more source

On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents the first third-party security analysis of TinyJAMBU, which is one of 32 second-round candidates in NIST’s lightweight cryptography standardization process. TinyJAMBU adopts an NLFSR based keyed-permutation that computes only a single
Dhiman Saha   +5 more
doaj   +1 more source

Requirement of a Membrane Potential for the Posttranslational Transfer of Proteins into Mitochondsria [PDF]

open access: yes, 1982
Posttranslational transfer of most precursor proteins into mitochondria is dependent on energization of the mitochondria. Experiments were carried out to determine whether the membrane potential or the intramitochondrial ATP is the immediate energy ...
Conboy J. G.   +37 more
core   +1 more source

TinyJAMBU Hardware Implementation for Low Power

open access: yesIEEE Access
In this paper, we present hardware implementations of the lightweight TinyJAMBU cipher with reduced power consumption using a mechanism based on shift register parallelization.
Carlos Fernandez-Garcia   +2 more
doaj   +1 more source

CCA Security with Short AEAD Tags

open access: yesIACR Communications in Cryptology
The size of the authentication tag represents a significant overhead for applications that are limited by bandwidth or memory. Hence, some authenticated encryption designs have a smaller tag than the required privacy level, which was also suggested by the NIST lightweight cryptography standardization project.
openaire   +1 more source

Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings

open access: yesIACR Transactions on Symmetric Cryptology
The best-known distinguisher on 7-round Ascon-128 and Ascon-128a AEAD uses a 60-dimensional cube where the nonce bits are set to be equal in the third and fourth rows of the Ascon state during initialization (Rohit et al. ToSC 2021/1).
Kai Hu
doaj   +1 more source

Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method

open access: yesCybersecurity
We present practical attacks on IAR-CTR and IAR-CFB, AE modes proposed by Hwang and Gope to offer both privacy and authenticity in a single pass. Then we use the idea of iCOFB, which is originally defined with a tweakable random function, to fix the IAR ...
Xueqi Zhu   +4 more
doaj   +1 more source

Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement

open access: yesInformation
The proliferation of Internet of Things (IoT) deployments demands Authentication and Key Agreement (AKA) protocols that scale from one initiator to many devices while preserving strong security guarantees on constrained hardware. Prior lightweight one-to-
Hussein El Ghor   +4 more
doaj   +1 more source

The unusual microtubule polarity in teleost retinal pigment epithelial cells. [PDF]

open access: yes, 1988
In cells of the teleost retinal pigment epithelium (RPE), melanin granules disperse into the RPE cells long apical projections in response to light onset, and aggregate toward the base of the RPE cell in response to dark onset.
BURNSIDE, Beth, Troutt, L
core   +1 more source

Investigation of optical properties of cadmium sulfide (CdS) thin films by chemical bath deposition.

open access: yesمجلة بغداد للعلوم, 2009
Thin films of CdS were deposited on glass substrates using a chemical bath deposition technique from aqueous solutions of Cadmium sulfate (CdS) and thiouria.
Selma M. H. Al-Jawad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy