Results 91 to 100 of about 44,791 (329)

Cell surface interactome analysis identifies TSPAN4 as a negative regulator of PD‐L1 in melanoma

open access: yesMolecular Oncology, EarlyView.
Using cell surface proximity biotinylation, we identified tetraspanin TSPAN4 within the PD‐L1 interactome of melanoma cells. TSPAN4 negatively regulates PD‐L1 expression and lateral mobility by limiting its interaction with CMTM6 and promoting PD‐L1 degradation.
Guus A. Franken   +7 more
wiley   +1 more source

New Methodology of Block Cipher Analysis Using Chaos Game

open access: yesJournal of ICT Research and Applications, 2014
Block cipher analysis  covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis.
Budi Sulistyo   +3 more
doaj  

CRITERIA FOR MARKOV BLOCK CIPHERS

open access: yesPrikladnaya diskretnaya matematika, 2018
Summary: We study probabilistic models of block ciphers with random independent identically distributed round keys. We call they Markov ciphers if sequence of round differentials is a simple homogeneous Markov chain. Criteria and sufficient condition for this property are adjusted and generalized.
openaire   +1 more source

PARP inhibition and pharmacological ascorbate demonstrate synergy in castration‐resistant prostate cancer

open access: yesMolecular Oncology, EarlyView.
Pharmacologic ascorbate (vitamin C) increases ROS, disrupts cellular metabolism, and induces DNA damage in CRPC cells. These effects sensitize tumors to PARP inhibition, producing synergistic growth suppression with olaparib in vitro and significantly delayed tumor progression in vivo. Pyruvate rescue confirms ROS‐dependent activity.
Nicolas Gordon   +13 more
wiley   +1 more source

The Block Cipher SC2000 [PDF]

open access: yes, 2002
In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256- bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers is S-box or logical operation, which has been well studied about
Takeshi Shimoyama   +7 more
openaire   +1 more source

LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro

open access: yesMolecular Oncology, EarlyView.
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix   +13 more
wiley   +1 more source

Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin

open access: yesMolecular Oncology, EarlyView.
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla   +10 more
wiley   +1 more source

Cryptanalysis of QTL Block Cipher

open access: yes, 2017
QTL is an ultra-lightweight block cipher designed for extremely constrained devices. The cipher has two versions, QLT-64 and QTL-128 supporting key lengths of 64 and 128 bits, respectively. In this paper, we present the first third party cryptanalysis of QTL. We first introduce related key distinguishers for full versions of the cipher.
Coban, Mustafa   +2 more
openaire   +2 more sources

Elastic Block Ciphers: The Feistel Cipher Case

open access: yes, 2004
We discuss the elastic versions of block ciphers whose round function processes subsets of bits from the data block differently, such as occurs in a Feistel network and in MISTY1. We focus on how specific bits are selected to be swapped after each round when forming the elastic version, using an elastic version of MISTY1 and differential cryptanalysis ...
Cook, Debra L.   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy