Results 151 to 160 of about 2,386,676 (394)

Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis [PDF]

open access: yesarXiv, 2006
We answer a question of Paterson, showing that all block systems for the group generated by the round functions of a key-alternating block cipher are the translates of a linear subspace. Following up remarks of Paterson and Shamir, we exhibit a connection to truncated differential cryptanalysis. We also give a condition that guarantees that the group
arxiv  

A note on some algebraic trapdoors for block ciphers

open access: yes, 2018
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core  

Obesity alters the fitness of peritumoral adipose tissue, exacerbating tumor invasiveness in renal cancer through the induction of ADAM12 and CYP1B1

open access: yesMolecular Oncology, EarlyView.
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad   +13 more
wiley   +1 more source

An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers [PDF]

open access: yes, 2017
Protecting software implementations of block ciphers from side channel attacks is a significant concern to realize secure embedded computation platforms.
Barenghi, Alessandro, Pelosi, Gerardo
core  

Attacks on Block Ciphers of Low Algebraic Degree [PDF]

open access: bronze, 2001
Thomas Jakobsen, Lars R. Knudsen
openalex   +1 more source

Addressing persistent challenges in digital image analysis of cancer tissue: resources developed from a hackathon

open access: yesMolecular Oncology, EarlyView.
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran   +16 more
wiley   +1 more source

Evaluation of Lightweight Block Ciphers in Hardware Implementation: A Comprehensive Survey [PDF]

open access: yesarXiv, 2017
The conventional cryptography solutions are ill-suited to strict memory, size and power limitations of resource-constrained devices, so lightweight cryptography solutions have been specifically developed for this type of applications. In this domain of cryptography, the term lightweight never refers to inadequately low security, but rather to ...
arxiv  

Impact of molecular diagnostics and targeted cancer therapy on patient outcomes (MODIFY): a retrospective study of the implementation of precision oncology

open access: yesMolecular Oncology, EarlyView.
The authors conducted a retrospective study of 94 patients with advanced cancer who underwent next‐generation sequencing (NGS) gene panel analysis and received targeted treatments when applicable. Results further support evidence indicating that molecular profiling provides clinical benefit.
Michaël Dang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy