Results 111 to 120 of about 2,386,676 (394)

Perfect Block Ciphers with Small Blocks [PDF]

open access: yes, 2007
Existing symmetric encryption algorithms target messages consisting of elementary binary blocks of at least 64 bits. Some applications need a block cipher which operates over smaller and possibly nonbinary blocks, which can be viewed as a pseudo-random permutation of n elements.
Thomas Pornin, Louis Granboulan
openaire   +2 more sources

KRAS and GNAS mutations in cell‐free DNA and in circulating epithelial cells in patients with intraductal papillary mucinous neoplasms—an observational pilot study

open access: yesMolecular Oncology, EarlyView.
This study demonstrates that KRAS and GNAS mutations are more prevalent in patients with resected intraductal papillary mucinous neoplasms (IPMN) compared to those under clinical surveillance. GNAS mutations significantly differ between the two patient cohorts, indicating that their absence may serve as a potential biomarker to support conservative ...
Christine Nitschke   +12 more
wiley   +1 more source

Intelligent Systems for Information Security [PDF]

open access: yesarXiv, 2014
This thesis aims to use intelligent systems to extend and improve performance and security of cryptographic techniques. Genetic algorithms framework for cryptanalysis problem is addressed. A novel extension to the differential cryptanalysis using genetic algorithm is proposed and a fitness measure based on the differential characteristics of the cipher
arxiv  

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation

open access: yesSecur. Commun. Networks, 2016
The growth of low-resource devices has increased rapidly in recent years. Communication in such devices presents two challenges: security and resource limitation.
B. Mohd   +3 more
semanticscholar   +1 more source

On‐treatment dynamics of circulating extracellular vesicles in the first‐line setting of patients with advanced non‐small cell lung cancer: the LEXOVE prospective study

open access: yesMolecular Oncology, EarlyView.
The LEXOVE prospective study evaluated plasma cell‐free extracellular vesicle (cfEV) dynamics using Bradford assay and dynamic light scattering in metastatic non‐small cell lung cancer patients undergoing first‐line treatments, correlating a ∆cfEV < 20% with improved median progression‐free survival in responders versus non‐responders.
Valerio Gristina   +17 more
wiley   +1 more source

On the provable security of BEAR and LION schemes [PDF]

open access: yesApplicable Algebra in Engineering, Communication and Computing, 2011, vol. 22, p. 413-423, 2011
BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). The ciphers proposed by Biham and Anderson are based on one stream cipher and one hash function.
arxiv  

Likelihood Estimation for Block Cipher Keys [PDF]

open access: yes, 1995
In this paper, we give a general framework for the analysis of block ciphers using the statistical technique of likelihood estimation. We show how various recent successful cryptanalyses of block ciphers can be regarded in this framework.
Murphy, Sean   +3 more
core   +1 more source

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck

open access: yesFast Software Encryption Workshop, 2016
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy, does not use any heuristics and returns optimal results.
A. Biryukov, V. Velichkov, Yann Le Corre
semanticscholar   +1 more source

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

Generation of Efficient Key Bit-Streams Using Sparse Matrix-Vector Multiplication [PDF]

open access: yesarXiv, 2012
The contribution of Stream ciphers to cryptography is immense. For fast encryption, stream ciphers are preferred to block ciphers due to their XORing operation, which is easier and faster to implement. In this paper we present a matrix based stream cipher, in which a m x n binary matrix single handedly performs the work of m parallel LFSRs.
arxiv  

Home - About - Disclaimer - Privacy