Results 91 to 100 of about 2,395,070 (371)

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

Plasmodium falciparum gametogenesis essential protein 1 (GEP1) is a transmission‐blocking target

open access: yesFEBS Letters, EarlyView.
This study shows Plasmodium falciparum GEP1 is vital for activating sexual stages of malarial parasites even independently of a mosquito factor. Knockout parasites completely fail gamete formation even when a phosphodiesterase inhibitor is added. Two single‐nucleotide polymorphisms (V241L and S263P) are found in 12%–20% of field samples.
Frederik Huppertz   +5 more
wiley   +1 more source

Biophysical analysis of angiotensin II and amyloid‐β cross‐interaction in aggregation and membrane disruption

open access: yesFEBS Letters, EarlyView.
Angiotensin II (AngII), a neuropeptide, interacts with amyloid‐β (Aβ), a key player in Alzheimer's disease. This study reveals that AngII reduces Aβ aggregation and membrane disruption in vitro. Biophysical assays and molecular modeling suggest AngII binds disordered Aβ forms, potentially modulating early amyloidogenic events and contributing to ...
Mohsen Habibnia   +5 more
wiley   +1 more source

Eliminating Variables in Boolean Equation Systems [PDF]

open access: yes, 2017
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar   +3 more
core   +1 more source

Perfect Block Ciphers with Small Blocks [PDF]

open access: yes, 2007
Existing symmetric encryption algorithms target messages consisting of elementary binary blocks of at least 64 bits. Some applications need a block cipher which operates over smaller and possibly nonbinary blocks, which can be viewed as a pseudo-random permutation of n elements.
Thomas Pornin, Louis Granboulan
openaire   +2 more sources

4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase in malaria parasites and enhances atovaquone efficacy

open access: yesFEBS Letters, EarlyView.
Atovaquone is an antimalarial requiring potentiation for sufficient efficacy. We pursued strategies to enhance its activity, showing that 4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase, decreasing ubiquinone biosynthesis. Since atovaquone competes with ubiquinol in mitochondria, 4‐nitrobenzoate facilitates its action, potentiating ...
Ignasi Bofill Verdaguer   +7 more
wiley   +1 more source

A New 128-Bit Block Cipher [PDF]

open access: yes, 2009
The evolvement of technology have resulted in a number of new proposals done on block ciphers such as KAMFEE, KAMKAR, ARIA, BLOWFISH256, DESL, REBC2, DSDP and etc. Even though there have been so much development of the block cipher, the industry still
Mohd Ali, Fakariah Hani
core  

Linked dimers of the AAA+ ATPase Msp1 reveal energetic demands and mechanistic plasticity for substrate extraction from lipid bilayers

open access: yesFEBS Letters, EarlyView.
Cells must clear mislocalized or faulty proteins from membranes to survive. The AAA+ ATPase Msp1 performs this task, but dissecting how its six subunits work together is challenging. We engineered linked dimers with varied numbers of functional subunits to reveal how Msp1 subunits cooperate and use energy to extract proteins from the lipid bilayer ...
Deepika Gaur   +5 more
wiley   +1 more source

Statistical assessment – as a part of security assessment applied to a block cipher [PDF]

open access: yesRevista Română de Statistică, 2016
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj  

The dynamics of the CBC Mode of Operation

open access: yes, 2016
In cryptography, the Cipher Block Chaining (CBC), one of the most commonly used mode in recent years, is a mode of operation that uses a block cipher to provide confidentiality or authenticity.
Abidi, Abdessalem   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy