Results 111 to 120 of about 2,395,070 (371)

Tonic signaling of the B‐cell antigen‐specific receptor is a common functional hallmark in chronic lymphocytic leukemia cell phosphoproteomes at early disease stages

open access: yesMolecular Oncology, EarlyView.
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez   +17 more
wiley   +1 more source

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck

open access: yesFast Software Encryption Workshop, 2016
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy, does not use any heuristics and returns optimal results.
A. Biryukov, V. Velichkov, Yann Le Corre
semanticscholar   +1 more source

Expression and DNA methylation of 20S proteasome subunits as prognostic and resistance markers in cancer

open access: yesMolecular Oncology, EarlyView.
Comprehensive analysis of genomic mutations, gene expression, DNA methylation, and pathway analysis of TCGA data was carried out to define cancer types in which proteasome subunits expression is associated with worse survival. Albeit the effect of specific proteasome subunits on cellular function, the main role of the proteasome is better evaluated ...
Ruba Al‐Abdulla   +5 more
wiley   +1 more source

Lightweight Structure of Random Key Generation for PRESENT Block Cipher [PDF]

open access: yesInternational Journal of Industrial Electronics, Control and Optimization
In this paper, we design a lightweight and modified random key generation for PRESENT block cipher which is applicable in the encryption of the digital signals. In the block ciphers, the master key is used directly in the encryption process for the data (
Bahram Rashidi
doaj   +1 more source

Detecting homologous recombination deficiency for breast cancer through integrative analysis of genomic data

open access: yesMolecular Oncology, EarlyView.
This study develops a semi‐supervised classifier integrating multi‐genomic data (1404 training/5893 validation samples) to improve homologous recombination deficiency (HRD) detection in breast cancer. Our method demonstrates prognostic value and predicts chemotherapy/PARP inhibitor sensitivity in HRD+ tumours.
Rong Zhu   +12 more
wiley   +1 more source

The "one-group-one-cipher" cryptograph of block-cipher based on chaotic

open access: yesTongxin xuebao, 2009
The"one-group-one-cipher"algorithm used the sequence from chaotic mapping as sub-key for block cipher was presented to solve the problem of weak keys existing in currently combined cipher algorithms.The randomness of abstracted key sequence was validated
XUAN Lei1, YAN Ji-ning1
doaj   +2 more sources

Cryptanalysis of QTL Block Cipher

open access: yes, 2017
QTL is an ultra-lightweight block cipher designed for extremely constrained devices. The cipher has two versions, QLT-64 and QTL-128 supporting key lengths of 64 and 128 bits, respectively. In this paper, we present the first third party cryptanalysis of QTL. We first introduce related key distinguishers for full versions of the cipher.
Mehmet Özen   +3 more
openaire   +3 more sources

Data‐driven discovery of gene expression markers distinguishing pediatric acute lymphoblastic leukemia subtypes

open access: yesMolecular Oncology, EarlyView.
This study investigates gene expression differences between two major pediatric acute lymphoblastic leukemia (ALL) subtypes, B‐cell precursor ALL, and T‐cell ALL, using a data‐driven approach consisting of biostatistics and machine learning methods. Following analysis of a discovery dataset, we find a set of 14 expression markers differentiating the ...
Mona Nourbakhsh   +8 more
wiley   +1 more source

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy