Results 51 to 60 of about 370,613 (347)

Subverting Telegram’s End-to-End Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance.
Benoît Cogliati   +2 more
doaj   +1 more source

Protecting FPGA bitstreams using authenticated encryption [PDF]

open access: yes2013 IEEE 11th International New Circuits and Systems Conference (NEWCAS), 2013
This paper describes low cost solution for bitstream security by adding authentication and encryption to the reconfiguration process using Authenticated Encryption (AE). Compact ASIC architecture for AE is presented: Counter with Cipher Block Chaining-Message Authentication Code (CCM).
Moussa Ali Abdellatif, Karim   +2 more
openaire   +1 more source

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction

open access: yesIACR Transactions on Symmetric Cryptology, 2020
The ongoing NIST lightweight cryptography standardization process highlights the importance of resistance to side-channel attacks, which has renewed the interest for Authenticated Encryption schemes (AEs) with light(er)-weight sidechannel secure ...
Chun Guo   +3 more
semanticscholar   +1 more source

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

Real-time encryption and authentication of medical video streams on FPGA [PDF]

open access: yes, 2016
This work presents an FPGA-based solution for the encryption and authentication of video streams of surgeries. The most important is minimal latency. To achieve this, a block cipher with an authenticated mode of operation is used.
Koninckx, Bob   +3 more
core  

A security architecture for personal networks [PDF]

open access: yes, 2006
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M.   +1 more
core   +2 more sources

An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things

open access: yesWireless Communications and Mobile Computing, 2020
In recent years, it has become popular to upload patients’ medical data to a third-party cloud server (TCS) for storage through medical Internet of things. It can reduce the local maintenance burden of the medical data and importantly improve accuracy in
Tianyu Chi, Baodong Qin, Dong Zheng
semanticscholar   +1 more source

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

Effective Caching for the Secure Content Distribution in Information-Centric Networking

open access: yes, 2018
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy