Results 111 to 120 of about 2,386,676 (394)
Perfect Block Ciphers with Small Blocks [PDF]
Existing symmetric encryption algorithms target messages consisting of elementary binary blocks of at least 64 bits. Some applications need a block cipher which operates over smaller and possibly nonbinary blocks, which can be viewed as a pseudo-random permutation of n elements.
Thomas Pornin, Louis Granboulan
openaire +2 more sources
This study demonstrates that KRAS and GNAS mutations are more prevalent in patients with resected intraductal papillary mucinous neoplasms (IPMN) compared to those under clinical surveillance. GNAS mutations significantly differ between the two patient cohorts, indicating that their absence may serve as a potential biomarker to support conservative ...
Christine Nitschke+12 more
wiley +1 more source
Intelligent Systems for Information Security [PDF]
This thesis aims to use intelligent systems to extend and improve performance and security of cryptographic techniques. Genetic algorithms framework for cryptanalysis problem is addressed. A novel extension to the differential cryptanalysis using genetic algorithm is proposed and a fitness measure based on the differential characteristics of the cipher
arxiv
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation
The growth of low-resource devices has increased rapidly in recent years. Communication in such devices presents two challenges: security and resource limitation.
B. Mohd+3 more
semanticscholar +1 more source
The LEXOVE prospective study evaluated plasma cell‐free extracellular vesicle (cfEV) dynamics using Bradford assay and dynamic light scattering in metastatic non‐small cell lung cancer patients undergoing first‐line treatments, correlating a ∆cfEV < 20% with improved median progression‐free survival in responders versus non‐responders.
Valerio Gristina+17 more
wiley +1 more source
On the provable security of BEAR and LION schemes [PDF]
BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). The ciphers proposed by Biham and Anderson are based on one stream cipher and one hash function.
arxiv
Likelihood Estimation for Block Cipher Keys [PDF]
In this paper, we give a general framework for the analysis of block ciphers using the statistical technique of likelihood estimation. We show how various recent successful cryptanalyses of block ciphers can be regarded in this framework.
Murphy, Sean+3 more
core +1 more source
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy, does not use any heuristics and returns optimal results.
A. Biryukov, V. Velichkov, Yann Le Corre
semanticscholar +1 more source
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić+31 more
wiley +1 more source
Generation of Efficient Key Bit-Streams Using Sparse Matrix-Vector Multiplication [PDF]
The contribution of Stream ciphers to cryptography is immense. For fast encryption, stream ciphers are preferred to block ciphers due to their XORing operation, which is easier and faster to implement. In this paper we present a matrix based stream cipher, in which a m x n binary matrix single handedly performs the work of m parallel LFSRs.
arxiv