Results 141 to 150 of about 2,386,676 (394)
This study explores how sepsis affects GC progression by creating an immunosuppressive environment. Our findings reveal that sepsis promotes immune dysregulation, enhancing tumor growth and metastasis. Targeting the PD‐1/PD‐L1 pathway with monoclonal antibodies shows potential for restoring immune function and improving outcomes in cancer patients ...
Yiding Wang+10 more
wiley +1 more source
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions.
Intisar Abid Yousif
doaj +1 more source
The dynamics of the CBC Mode of Operation
In cryptography, the Cipher Block Chaining (CBC), one of the most commonly used mode in recent years, is a mode of operation that uses a block cipher to provide confidentiality or authenticity.
Abidi, Abdessalem+4 more
core +1 more source
Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining [PDF]
Paweł Chodowiec, Po Khuon, Kris Gaj
openalex +1 more source
VASP was found to be overexpressed in metastatic oral squamous cell carcinoma (OSCC) tissues. Notably, PTTG1‐ and VASP‐deficient OSCC cells demonstrated suppressed metastatic properties by disrupting the interaction between the cytoskeleton and focal adhesion (FAs) in the filopodia region.
Suyeon Park+6 more
wiley +1 more source
Introduction: Growing application of medical information systems and various digital communication channels to transfer and share vital and medical information demonstrate the significance of medical data security and privacy policy.
Mohammadreza Naeemabadi+2 more
doaj
SOSEMANUK: a fast software-oriented stream cipher [PDF]
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security.
arxiv
Physical attacks on block ciphers [PDF]
The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of the cryptographic algorithm. A new class of attacks, called physical attacks, has shown the capability to exploit the unintentional physical behaviors from the cryptographic device, which usually provide
openaire +4 more sources
Consensus molecular subtypes (CMS1‐4) have been identified to study colorectal cancer heterogeneity and serve as potential biomarkers. In this study, we developed and evaluated NanoCMSer, a NanoString‐based classifier using 55 genes, optimized for FF and FFPE to facilitate the clinical evaluation of CMS subtyping.
Arezo Torang+10 more
wiley +1 more source
FPE scheme based on k-splits Feistel network
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI+3 more
doaj +2 more sources