Results 101 to 110 of about 2,410,295 (395)
Glutaredoxin (Grx) 3 proteins contain a thioredoxin domain and one to three class II Grx domains. These proteins play a crucial role in iron homeostasis in eukaryotic cells. In human Grx3, at least one of the two Grx domains, together with the thioredoxin domain, is essential for its function in iron metabolism.
Laura Magdalena Jordt+4 more
wiley +1 more source
Cryptanalysis of QTL Block Cipher
QTL is an ultra-lightweight block cipher designed for extremely constrained devices. The cipher has two versions, QLT-64 and QTL-128 supporting key lengths of 64 and 128 bits, respectively. In this paper, we present the first third party cryptanalysis of QTL. We first introduce related key distinguishers for full versions of the cipher.
Mehmet Özen+3 more
openaire +3 more sources
Perfect Block Ciphers with Small Blocks [PDF]
Existing symmetric encryption algorithms target messages consisting of elementary binary blocks of at least 64 bits. Some applications need a block cipher which operates over smaller and possibly nonbinary blocks, which can be viewed as a pseudo-random permutation of n elements.
Thomas Pornin, Louis Granboulan
openaire +2 more sources
Summary of Topological Study of Chaotic CBC Mode of Operation [PDF]
In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryption systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to provide confidentiality or authenticity. In this research work, we intend to summarize our results that have been detailed in our
arxiv
Dimeric pyruvate formate‐lyase cleaves pyruvate using a radical‐based mechanism. G734 serves as a radical storage location, and the radical is transferred to the catalytic C419 residue. Mutation of the C418‐C419 pair causes loss of enzyme activity, but does not impede radical introduction onto G734. Therefore, cis‐ but not trans‐radical transfer occurs
Michelle Kammel+2 more
wiley +1 more source
Likelihood Estimation for Block Cipher Keys [PDF]
In this paper, we give a general framework for the analysis of block ciphers using the statistical technique of likelihood estimation. We show how various recent successful cryptanalyses of block ciphers can be regarded in this framework.
Murphy, Sean+3 more
core +1 more source
Statistical assessment – as a part of security assessment applied to a block cipher [PDF]
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers. However, for the case of invertible primitives, there is a glitch.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source
Software system of cryptanalysis using impossible differentials method based on parallel programming technologies OpenMP and MPI [PDF]
Програма, яка розробляється в даному проекті, призначена для проведення криптоаналізу методом неможливих диференціалів блокового симетричного шифру AES, а саме – над елементами раунду.The program is being developed in this project is designed for ...
Novak, Nazarii+1 more
core
To explore the impact of the overexpression of the multidrug‐transporter P‐glycoprotein (ABCB1) on membrane fluidity, we compared the transversal gradient of mobility and microviscosity in plasma membranes of drug‐sensitive Chinese hamster ovary cells (AuxB1) and their multidrug‐resistant derivatives (B30) using the fluorescent n‐(9‐anthroyloxy) fatty ...
Roger Busche+2 more
wiley +1 more source