Results 41 to 50 of about 44,265 (336)
ABSTRACT Background Cyclophosphamide (CY) is associated with potentially fatal cardiotoxicity, yet no electrocardiographic indices have been established for early detection of CY‐induced cardiomyopathy. This study aimed to determine whether corrected QT interval (QTc) prolongation can predict early onset of CY‐related cardiac dysfunction in pediatric ...
Junpei Kawamura +5 more
wiley +1 more source
A New Type of Cipher: DICING_csb [PDF]
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core +2 more sources
Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich +2 more
doaj +1 more source
ABSTRACT Background B‐acute lymphoblastic leukemia (B‐ALL) is the most common pediatric cancer, and while most children in high‐resource settings are cured, therapy carries risks for long‐term toxicities. Understanding parents’ concerns about these late effects is essential to guide anticipatory support and inform evolving therapeutic approaches ...
Kellee N. Parker +7 more
wiley +1 more source
Pengembangan Modul Enkripsi dan Dekripsi pada Php dengan Modifikasi Metode Kriptografi Vigenere Cipher dan Cipher Block Chaining (Studi Kasus pada Geekybyte.com) [PDF]
Penggunaan fungsi hash pada pengamanan data atau informasi pada sebuah web site sudah tidak aman lagi, karena memiliki kelemahan berupa collision. Pengamanan yang dilakukan tidak tergantung pada kerahasiaan metode atau algortima yang digunakan, tetapi ...
Aribowo, E. (Eko) +1 more
core
ABSTRACT Background B‐cell lymphoblastic lymphoma (B‐LBL) represents a rare variety of non‐Hodgkin lymphoma, with limited research on its biology, progression, and management. Methods A retrospective analysis was performed on the clinical characteristics of 256 patients aged ≤18 years who received treatment under the China Net Childhood Lymphoma (CNCL)‐
Zhijuan Liu +20 more
wiley +1 more source
BRISK: Dynamic Encryption Based Cipher for Long Term Security
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal.
Ashutosh Dhar Dwivedi
doaj +1 more source
ABSTRACT Introduction Cognitive impairment and exercise intolerance are common in dialysis patients. Cerebral perfusion and oxygenation play a major role in both cognitive function and exercise execution; HD session per se aggravates cerebral ischemia in this population. This study aimed to compare cerebral oxygenation and perfusion at rest and in mild
Marieta P. Theodorakopoulou +10 more
wiley +1 more source
Single Key Variant of PMAC_Plus
At CRYPTO 2011, Yasuda proposed the PMAC_Plus message authentication code based on an n-bit block cipher. Its design principle inherits the well known PMAC parallel network with a low additional cost.
Nilanjan Datta +4 more
doaj +1 more source
Designing a Block Cipher in Galois Extension Fields for IoT Security
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ...
Kiernan George, Alan J. Michaels
doaj +1 more source

