Results 31 to 40 of about 717,304 (368)
High Speed Area Efficient FPGA Implementation of AES Algorithm
Now a day digital information is very easy to process, but it allows unauthorized users to access this information. To protect this information from unauthorized access, Advanced Encryption Standard (AES) is one of the most frequently used symmetric key ...
P. Mane, A. Mulani, Articles Info
semanticscholar +1 more source
Message security is something that must be kept secretly. However, to maintain the security and the secret of a message it takes two different methods. To maintain the security of messages, the science that has been widely used is to use cryptography. As
Rahmat Sulaiman
doaj +1 more source
DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY
We live in a world where the Internet has become the backbone of most of our dealings. The Internet has turned this big planet into a small village. The internet can be reached by everyone, everywhere, and anytime. Some authors predict that the number of
Malek M. Barhoush +4 more
doaj +1 more source
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments
Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and different applications has been popularly applied to different domains, such as healthcare and smart farming, for helping people to do something, aiming to ...
K. Tsai +5 more
semanticscholar +1 more source
Exploring the causes of adverse events in hospitals and potential prevention strategies [PDF]
Objectives To examine the causes of adverse events (AEs) and potential prevention strategies to minimise the occurrence of AEs in hospitalised patients.
Groenewegen, P.P., +6 more
core +4 more sources
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Passive physical attacks, like power analysis, pose a serious threat to the security of digital circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption Standard (AES) hardware design that is completely scalable in ...
Hannes Gross, S. Mangard, Thomas Korak
semanticscholar +1 more source
Incidence and time course of everolimus-related adverse events in postmenopausal women with hormone receptor-positive advanced breast cancer: insights from BOLERO-2. [PDF]
BackgroundIn the BOLERO-2 trial, everolimus (EVE), an inhibitor of mammalian target of rapamycin, demonstrated significant clinical benefit with an acceptable safety profile when administered with exemestane (EXE) in postmenopausal women with hormone ...
Baselga, J +18 more
core +1 more source
AE 941 [Arthrovas, Neoretna, Psovascar] is shark cartilage extract that inhibits angiogenesis. AE 941 acts by blocking the two main pathways that contribute to the process of angiogenesis, matrix metalloproteases and the vascular endothelial growth factor signalling pathway.
openaire +2 more sources
Chromoelectric fields and quarkonium-hadron interactions at high energies
We develop a simple model to study the heavy quarkonium-hadron cross section in the high energy limit. The hadron is represented by an external electric color field (capacitor) and the heavy quarkonium is represented by a small color dipole.
D. A. Fogaça +6 more
core +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources

