Results 121 to 130 of about 84,080 (308)

Statistical Analysis of Encryption Quality for Medical Images Based on Rijndael Encryption Algorithm Using Both Static and Chaotic Cipher Key

open access: yesمجله انفورماتیک سلامت و زیست پزشکی, 2014
Introduction: Growing application of medical information systems and various digital communication channels to transfer and share vital and medical information demonstrate the significance of medical data security and privacy policy.
Mohammadreza Naeemabadi   +2 more
doaj  

Cryptography Using Quasi Group and Chaotic Maps [PDF]

open access: yes, 2018
In this paper a symmetric key (stream cipher mode/block cipher mode) cryptosystem is proposed, involving chaotic maps and quasi group. The proposed cryptosystem destroys any existing patterns in the input, and also, it maximizes entropy.
Abughali, Heba, Mikki, Mohammad
core  

SOSEMANUK: a fast software-oriented stream cipher [PDF]

open access: yesNew Stream Cipher Designs - The eSTREAM finalists (2008) 98-118, 2008
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security.
arxiv  

Addressing persistent challenges in digital image analysis of cancer tissue: resources developed from a hackathon

open access: yesMolecular Oncology, EarlyView.
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran   +16 more
wiley   +1 more source

FPE scheme based on k-splits Feistel network

open access: yesTongxin xuebao, 2012
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI   +3 more
doaj   +2 more sources

A note on some algebraic trapdoors for block ciphers

open access: yes, 2018
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core  

Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis [PDF]

open access: yesarXiv, 2006
We answer a question of Paterson, showing that all block systems for the group generated by the round functions of a key-alternating block cipher are the translates of a linear subspace. Following up remarks of Paterson and Shamir, we exhibit a connection to truncated differential cryptanalysis. We also give a condition that guarantees that the group
arxiv  

Attacks on Block Ciphers of Low Algebraic Degree [PDF]

open access: bronze, 2001
Thomas Jakobsen, Lars R. Knudsen
openalex   +1 more source

Impact of molecular diagnostics and targeted cancer therapy on patient outcomes (MODIFY): a retrospective study of the implementation of precision oncology

open access: yesMolecular Oncology, EarlyView.
The authors conducted a retrospective study of 94 patients with advanced cancer who underwent next‐generation sequencing (NGS) gene panel analysis and received targeted treatments when applicable. Results further support evidence indicating that molecular profiling provides clinical benefit.
Michaël Dang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy