Results 51 to 60 of about 342,669 (235)

Unconventional miR-122 binding stabilizes the HCV genome by forming a trimolecular RNA structure. [PDF]

open access: yes, 2013
MicroRNAs (miRNAs) typically downregulate protein expression from target mRNAs through limited base-pairing interactions between the 5' 'seed' region of the miRNA and the mRNA 3' untranslated region (3'UTR). In contrast to this established mode of action,
Doudna, Jennifer A, Mortimer, Stefanie A
core   +1 more source

Synthesis and Behavior of DNA Oligomers Containing the Ambiguous Z-Nucleobase 5-Aminoimidazole-4-carboxamide

open access: yesMolecules, 2023
5-Amino-1-β-D-ribofuranosylimidazole-4-carboxamide 5′-monophosphate (ZMP) is a central intermediate in de novo purine nucleotide biosynthesis. Its nucleobase moiety, 5-aminoimidazole-4-carboxamide (Z-base), is considered an ambiguous base that can pair ...
Yuhei Nogi   +3 more
doaj   +1 more source

Report on Pairing-based Cryptography

open access: yesJournal of Research of the National Institute of Standards and Technology, 2015
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings.
René Peralta   +5 more
openaire   +3 more sources

AFM Images of Viroid-Sized Rings That Self-Assemble from Mononucleotides through Wet–Dry Cycling: Implications for the Origin of Life

open access: yesLife, 2020
It is possible that early life relied on RNA polymers that served as ribozyme-like catalysts and for storing genetic information. The source of such polymers is uncertain, but previous investigations reported that wet–dry cycles simulating prebiotic hot ...
Tue Hassenkam   +3 more
doaj   +1 more source

Ground state and glass transition of the RNA secondary structure

open access: yes, 2006
RNA molecules form a sequence-specific self-pairing pattern at low temperatures. We analyze this problem using a random pairing energy model as well as a random sequence model that includes a base stacking energy in favor of helix propagation.
Bundschuh   +31 more
core   +1 more source

Unconventional superconductivity in iron-base superconductors in a three-band model [PDF]

open access: yes, 2014
Iron-base superconductors exhibits features of systems where the Fulde-Ferrel-Larkin-Ovchinnikov (FFLO) phase, a superconducting state with non-zero total momentum of Cooper pairs, is actively sought. Experimental and theoretical evidence points strongly
Crivelli, Dawid, Ptok, Andrzej
core   +2 more sources

An alternative understanding of mass formulas in terms of nuclear structure [PDF]

open access: yes, 2004
A typical form of mass formula is re-explained in terms of nuclear structure. For $ N \approx Z $ nuclei, we propose to start with the shell model picture and to consider the T=0 $2n-2p$ ($\alpha$-like) correlations as the fundamental concept, instead ...
Hasegawa, M., Kaneko, K.
core   +3 more sources

Partition function and base pairing probabilities of RNA heterodimers

open access: yesAlgorithms for Molecular Biology, 2006
Background RNA has been recognized as a key player in cellular regulation in recent years. In many cases, non-coding RNAs exert their function by binding to other nucleic acids, as in the case of microRNAs and snoRNAs.
Stadler Peter F   +5 more
doaj   +1 more source

Pulling hairpinned polynucleotide chains: Does base-pair stacking interaction matter?

open access: yes, 2001
Force-induced structural transitions both in relatively random and in designed single-stranded DNA (ssDNA) chains are studied theoretically. At high salt conditions, ssDNA forms compacted hairpin patterns stabilized by base-pairing and base-pair stacking
Haijun Zhou, Moroz J. D., Yang Zhang
core   +1 more source

Lattice Attacks on Pairing-Based Signatures [PDF]

open access: yesInformation Security Journal: A Global Perspective, 2017
Practical implementations of cryptosystems often suffer from critical information leakage through side-channels (such as their power consumption or their electromagnetic emanations). For public-key cryptography on embedded systems, the core operation is usually group exponentiation – or scalar multiplication on elliptic curves – which is a sequence of ...
Damien Vergnaud   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy