Results 41 to 50 of about 29,404 (289)

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

Subverting Telegram’s End-to-End Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance.
Benoît Cogliati   +2 more
doaj   +1 more source

Real-time encryption and authentication of medical video streams on FPGA [PDF]

open access: yes, 2016
This work presents an FPGA-based solution for the encryption and authentication of video streams of surgeries. The most important is minimal latency. To achieve this, a block cipher with an authenticated mode of operation is used.
Koninckx, Bob   +3 more
core  

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Inhibiting stearoyl‐CoA desaturase suppresses bone metastatic prostate cancer by modulating cellular stress, mTOR signaling, and DNA damage response

open access: yesFEBS Letters, EarlyView.
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson   +7 more
wiley   +1 more source

The COLM Authenticated Encryption Scheme

open access: yesJournal of Cryptology
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Andreeva, Elena   +7 more
openaire   +4 more sources

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +1 more source

Key Assignment Schemes with Authenticated Encryption, revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2020
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme.
Jeroen Pijnenburg, Bertram Poettering
doaj   +1 more source

Home - About - Disclaimer - Privacy