Results 121 to 130 of about 2,398,687 (396)

Generation of Efficient Key Bit-Streams Using Sparse Matrix-Vector Multiplication [PDF]

open access: yesarXiv, 2012
The contribution of Stream ciphers to cryptography is immense. For fast encryption, stream ciphers are preferred to block ciphers due to their XORing operation, which is easier and faster to implement. In this paper we present a matrix based stream cipher, in which a m x n binary matrix single handedly performs the work of m parallel LFSRs.
arxiv  

Combined spatially resolved metabolomics and spatial transcriptomics reveal the mechanism of RACK1‐mediated fatty acid synthesis

open access: yesMolecular Oncology, EarlyView.
The authors analyzed the spatial distributions of gene and metabolite profiles in cervical cancer through spatial transcriptomic and spatially resolved metabolomic techniques. Pivotal genes and metabolites within these cases were then identified and validated.
Lixiu Xu   +3 more
wiley   +1 more source

Software system of cryptanalysis using impossible differentials method based on parallel programming technologies OpenMP and MPI [PDF]

open access: yes, 2013
Програма, яка розробляється в даному проекті, призначена для проведення криптоаналізу методом неможливих диференціалів блокового симетричного шифру AES, а саме – над елементами раунду.The program is being developed in this project is designed for ...
Novak, Nazarii   +1 more
core  

Circulating tumor DNA (ctDNA) trajectories predict survival in trifluridine/tipiracil‐treated metastatic colorectal cancer patients

open access: yesMolecular Oncology, EarlyView.
The authors applied joint/mixed models that predict mortality of trifluridine/tipiracil‐treated metastatic colorectal cancer patients based on circulating tumor DNA (ctDNA) trajectories. Patients at high risk of death could be spared aggressive therapy with the prospect of a higher quality of life in their remaining lifetime, whereas patients with a ...
Matthias Unseld   +7 more
wiley   +1 more source

The "one-group-one-cipher" cryptograph of block-cipher based on chaotic

open access: yesTongxin xuebao, 2009
The"one-group-one-cipher"algorithm used the sequence from chaotic mapping as sub-key for block cipher was presented to solve the problem of weak keys existing in currently combined cipher algorithms.The randomness of abstracted key sequence was validated
XUAN Lei1, YAN Ji-ning1
doaj   +2 more sources

Lightweight Structure of Random Key Generation for PRESENT Block Cipher [PDF]

open access: yesInternational Journal of Industrial Electronics, Control and Optimization
In this paper, we design a lightweight and modified random key generation for PRESENT block cipher which is applicable in the encryption of the digital signals. In the block ciphers, the master key is used directly in the encryption process for the data (
Bahram Rashidi
doaj   +1 more source

An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers [PDF]

open access: yes, 2017
Protecting software implementations of block ciphers from side channel attacks is a significant concern to realize secure embedded computation platforms.
Barenghi, Alessandro, Pelosi, Gerardo
core  

Integrative systems‐level analysis reveals a contextual crosstalk between hypoxia and global metabolism in human breast tumors

open access: yesMolecular Oncology, EarlyView.
Breast tumor samples scored for metabolic deregulation (M1 to M3) were given a hypoxia score (HS). The highest HS occurred in patients with strongest metabolic deregulation (M3), supporting tumor aggressiveness. HS correlated with the highest number of metabolic pathways in M1. This suggests hypoxia to be an early event in metabolic deregulation.
Raefa Abou Khouzam   +2 more
wiley   +1 more source

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy