Results 71 to 80 of about 9,006 (193)
Proton translocation in proteins [PDF]
The active transport of protons across the low dielectric barrier imposed by biological membranes is accomplished by a plethora of proteins that span the ca. 40 Å of the phospholipid bilayer.
Chan, Sunney I., Copeland, Robert A.
core +1 more source
Due to their nanoscale dimensions and excellent designability, nanomaterials can regulate the different stages of biomimetic mineralization of dental hard tissue. They play a corresponding role in the function of the raw materials for mineralization, mineralized microenvironment, mineralization guidance, and the function of mineralized products ...
Danni Dai, Dan Li, Chao Zhang
wiley +1 more source
Lightweight authentication protocol for connected medical IoT through privacy-preserving access
With the rapid progress of communication technology, the Internet of Things (IoT) has emerged as an essential element in our daily lives. Given that the IoT encompasses diverse devices that often have limited resources in terms of communication ...
Muhammad Tanveer +3 more
doaj +1 more source
USE OF MICROWAVE RADIATION TO CONTROL SOME STORAGE INSECTS IN RICE [PDF]
The microwave radiation had a considerable effect on the mortality percentage for the three species. The highest percentage of mortality was (14.61%) for Oryzaephilus surinamensis.
Aead Yousif Haj Ismail +1 more
doaj +1 more source
Analysis of Atom against quantum attacks
A cost estimation of Grover’s key search attack on the stream cipher Atom is provided, taking into account circuit depth restrictions specified by NIST’s PQC standardisation process. The quantum circuit of Atom is implemented using QISKIT, and the results are compared with other LFSR‐based stream ciphers, including Grain‐v1, Grain‐128‐AEAD, and Lizard.
Ravi Anand, Rimpa Nandi, Takanori Isobe
wiley +1 more source
Порівняння AEAD-алгоритмів для вбудованих систем інтернету речей
Виконано порівняння за швидкодією і вимогами до пам’яті реалізацій АЕAD-шифрів AESGCM та ChaCha20-Poly1305 для типових 8/16/32-бітних вбудованих low-end процесорів у складі пристроїв Інтернету речей за різних підходів до забезпечення стійкості до часових атак і простих атак на енергоспоживання.
Sovyn, Y., Khoma, V., Otenko, V.
openaire +2 more sources
Abstract Background Hydroxyurea (HU) is a commonly used first‐line treatment in patients with polycythemia vera (PV). However, approximately 15%–24% of PV patients report intolerance and resistance to HU. Methods This phase IV, European, real‐world, observational study assessed the efficacy and safety of ruxolitinib in PV patients who were resistant ...
Alexandre Theocharides +17 more
wiley +1 more source
On the Security of Sponge-type Authenticated Encryption Modes
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. In fact, one can assess the popularity of this mode from the fact that around 25 out of the 56 round 1 submissions to the ongoing NIST lightweight ...
Bishwajit Chakraborty +2 more
doaj +1 more source
A pentapeptide as minimal antigenic determinant for MHC class I-restricted T lymphocytes [PDF]
Peptides that are antigenic for T lymphocytes are ligands for two receptors, the class I or II glycoproteins that are encoded by genes in the major histocompatibility complex, and the idiotypic / chain T-cell antigen receptor1–9. That a peptide must bind
A Sette +30 more
core +1 more source
New Differential‐Based Distinguishers for Ascon via Constraint Programming
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self‐evaluation and third‐party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several differential‐based distinguishers.
Chan Song +3 more
wiley +1 more source

