Results 231 to 240 of about 1,391,504 (276)
Some of the next articles are maybe not open access.
Affine encryption technique based on quadratic function
Informatics and Mathematical Methods in SimulationAffine ciphers originated in ancient times. However, despite the advent of modern cryptographic standards, they are still relevant in cryptography.
М.M. Kasianchuk, М.P. Holembiovskyi
semanticscholar +1 more source
Affinity chromatography of fibroblast growth factors on substituted polystyrene
Journal of Chromatography B: Biomedical Sciences and Applications, 1990The heparin-binding growth factors aFGF and bFGF (acidic and basic fibroblast growth factor) from crude bovine brain extract were co-eluted with purified [125I]aFGF and/or [125I]bFGF as tracers from heparin-Sepharose and from several insoluble substituted polystyrenes used as stationary phases in low-pressure affinity chromatography. The ability of the
M A, Dourges +5 more
openaire +2 more sources
Electron affinities of aza-substituted polycyclic aromatic hydrocarbons
Canadian Journal of Chemistry, 1989Electron affinities for aza-substituted polycyclic aromatics were determined from measurements of electron transfer equilibria in the dilute gas phase with a pulsed electron high pressure mass spectrometer (PHPMS). These are (in kcal/mol): quinazoline (12.7), quinoxaline (15.8), cinnoline (16.0), acridine (20.3), benzo[c]cinnoline (20.6), pyrido[2,3-b]
Glen W. Dillow, P. Kebarle
openaire +1 more source
Substructural Abstract Syntax with Variable Binding and Single-Variable Substitution
Logic in Computer ScienceWe develop a unified categorical theory of substructural abstract syntax with variable binding and single-variable (capture-avoiding) substitution. This is done for the gamut of context structural rules given by exchange (linear theory) with weakening ...
Marcelo Fiore, Sanjiv Ranchod
semanticscholar +1 more source
European Journal of Pure and Applied Mathematics
This paper presents a multiple RGB image encryption scheme that utilizes a pair of 8×8 S-boxes constructed over the residue classes of Eisenstein integers Z[Ω]π, implemented within a three-stage Substitution–Permutation Network (SPN) architecture.
Maha Alammari +3 more
semanticscholar +1 more source
This paper presents a multiple RGB image encryption scheme that utilizes a pair of 8×8 S-boxes constructed over the residue classes of Eisenstein integers Z[Ω]π, implemented within a three-stage Substitution–Permutation Network (SPN) architecture.
Maha Alammari +3 more
semanticscholar +1 more source
Novel substituted pyrrolidines are high affinity histamine H3 receptor antagonists
Bioorganic & Medicinal Chemistry Letters, 2010Pre-clinical characterization of novel substituted pyrrolidines that are high affinity histamine H(3) receptor antagonists is described. These compounds efficiently penetrate the CNS and occupy the histamine H(3) receptor in rat brain following oral administration. One compound, (2S,4R)-1-[2-(4-cyclobutyl-[1,4]diazepane-1-carbonyl)-4-(3-fluoro-phenoxy)-
Emily M, Stocking +17 more
openaire +2 more sources
ICT Research
In recent years, one research direction that has garnered significant attention from scientists is enhancing the security of SPN block ciphers against strong cryptanalysis attacks through dynamic methods.
Tran Thi Luong
semanticscholar +1 more source
In recent years, one research direction that has garnered significant attention from scientists is enhancing the security of SPN block ciphers against strong cryptanalysis attacks through dynamic methods.
Tran Thi Luong
semanticscholar +1 more source
2025 1st International Conference on Radio Frequency Communication and Networks (RFCoN)
The encryption of digital images requires specialized cryptographic techniques due to their unique characteristics, such as strong pixel correlation, high data redundancy and large storage requirements.
Gnanapriya B +4 more
semanticscholar +1 more source
The encryption of digital images requires specialized cryptographic techniques due to their unique characteristics, such as strong pixel correlation, high data redundancy and large storage requirements.
Gnanapriya B +4 more
semanticscholar +1 more source
Russian Chemical Bulletin, 2011
In terms of the density functional theory (DFT) using B3LYP/6-31G(d) method with full geometry optimization, gas-phase quantum chemical calculations were performed for σ-complexes formed upon the attack of electrophiles E (E = H+, Me+, Me3Si+, Br+, NO2 +, MeCO+, SO3) on α- and β-positions of furan, thiophene, selenophene, pyrrole, and N-substituted ...
L. I. Belen’kii +2 more
openaire +1 more source
In terms of the density functional theory (DFT) using B3LYP/6-31G(d) method with full geometry optimization, gas-phase quantum chemical calculations were performed for σ-complexes formed upon the attack of electrophiles E (E = H+, Me+, Me3Si+, Br+, NO2 +, MeCO+, SO3) on α- and β-positions of furan, thiophene, selenophene, pyrrole, and N-substituted ...
L. I. Belen’kii +2 more
openaire +1 more source
The Proton Affinity of Some Substituted Naphtalenes
Journal of physical organic chemistry, 1999The absolute proton affinity (PA) pertaining aromatic carbons of the monosubstituted naphtalenes involving CH3, OH, CHO, NO2 and Cl substituents is calculated at the MP2(fc)/6-31G**//HF/6-31G* + ZPVE(HF/6-31G*) level of theory. Increments corresponding to unsubstituted positions within the naphtalene skeleton are estimated.
Eckert-Maksić, Mirjana +3 more
openaire +2 more sources

