Results 101 to 110 of about 2,386,676 (394)

The solution supramolecular structure of α2 → 8 polysialic acid suggests a structural cause for its low immunogenicity

open access: yesFEBS Letters, EarlyView.
α2 → 8 polysialic acid elicits poor immunogenicity. Small‐angle scattering shows a supramolecular structure with parallel‐chain binding, although in different forms at μm and mm calcium. The major histocompatibility complex requires molecular weights around 2000 Da to produce antibodies, and 2000 Da polysialic oligomers will bind in these structures ...
Kenneth A. Rubinson
wiley   +1 more source

On Compression of Data Encrypted with Block Ciphers [PDF]

open access: yesarXiv, 2010
This paper investigates compression of data encrypted with block ciphers, such as the Advanced Encryption Standard (AES). It is shown that such data can be feasibly compressed without knowledge of the secret key. Block ciphers operating in various chaining modes are considered and it is shown how compression can be achieved without compromising ...
arxiv  

Identification of functional and diverse circulating cancer‐associated fibroblasts in metastatic castration‐naïve prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink   +6 more
wiley   +1 more source

Circulating tumor cells in metastatic breast cancer patients treated with immune checkpoint inhibitors – a biomarker analysis of the ALICE and ICON trials

open access: yesMolecular Oncology, EarlyView.
In this explorative biomarker analysis, we assessed serial sampling of circulating tumor cells (CTCs) with CellSearch in two randomized trials testing immune checkpoint inhibitors (ICIs) in metastatic breast cancer. Our data demonstrate a prognostic potential of CTCs, most apparent 4 weeks into ICI therapy.
Nikolai Kragøe Andresen   +13 more
wiley   +1 more source

Summary of Topological Study of Chaotic CBC Mode of Operation [PDF]

open access: yesarXiv, 2017
In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryption systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to provide confidentiality or authenticity. In this research work, we intend to summarize our results that have been detailed in our
arxiv  

Circulating tumor cells: advancing personalized therapy in small cell lung cancer patients

open access: yesMolecular Oncology, EarlyView.
Small cell lung cancer (SCLC) is an aggressive form of lung cancer that spreads rapidly to secondary sites such as the brain and liver. Cancer cells circulating in the blood, “circulating tumor cells” (CTCs), have demonstrated prognostic value in SCLC, and evaluating biomarkers on CTCs could guide treatment decisions such as for PARP inhibitors ...
Prajwol Shrestha   +6 more
wiley   +1 more source

Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers. However, for the case of invertible primitives, there is a glitch.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

A comparative study of circulating tumor cell isolation and enumeration technologies in lung cancer

open access: yesMolecular Oncology, EarlyView.
Lung cancer cells were spiked into donor blood to evaluate the recovery rates of the following circulating tumor cell (CTC) enrichment technologies: CellMag™, EasySep™, RosetteSep™, Parsortix® PR1, and Parsortix® Prototype systems. Each method's advantages and disadvantages are described.
Volga M Saini   +11 more
wiley   +1 more source

Statistical assessment – as a part of security assessment applied to a block cipher [PDF]

open access: yesRevista Română de Statistică, 2016
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj  

Software Implementation And Evaluation Of Lightweight Symmetric Block Ciphers Of The Energy Perspectives And Memory [PDF]

open access: yesInternational Journal of Engineering Education (IJEE) March-April 2017 Vole 9, No 2, 2017
Lightweight ciphers are the form of encryption that strictly limited to devices such as tags, RFID, wireless sensor networks applications. Low-resource devices has many limitations in power, energy and memory. In this work, the lightweight block ciphers is implemented on the Atmega128 microprocessor and the results of the energy perspectives and memory
arxiv  

Home - About - Disclaimer - Privacy