Results 51 to 60 of about 44,002 (291)

4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase in malaria parasites and enhances atovaquone efficacy

open access: yesFEBS Letters, EarlyView.
Atovaquone is an antimalarial requiring potentiation for sufficient efficacy. We pursued strategies to enhance its activity, showing that 4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase, decreasing ubiquinone biosynthesis. Since atovaquone competes with ubiquinol in mitochondria, 4‐nitrobenzoate facilitates its action, potentiating ...
Ignasi Bofill Verdaguer   +7 more
wiley   +1 more source

Linear Key-schedule’s Properties of the Smallpresent Block Cipher

open access: yesБезопасность информационных технологий, 2013
SmallPresent block cipher was presented to investigate attacks on the PRESENT block cipher in details. In the paper the resistance to linear cryptanalysis of this cipher with arbitrary linear key-schedule is under consideration.
Georgy Igorevich Khoruzhenko   +1 more
doaj  

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

The anti‐CRISPR protein AcrIE8.1 inhibits the type I‐E CRISPR‐Cas system by directly binding to the Cascade subunit Cas11

open access: yesFEBS Letters, EarlyView.
In this study, we present the structure of AcrIE8.1, a previously uncharacterized anti‐CRISPR protein that inhibits the type I‐E CRISPR‐Cas system. Through a combination of structural and biochemical analyses, we demonstrate that AcrIE8.1 directly binds to the Cas11 subunit of the Cascade complex to inhibit the CRISPR‐Cas system.
Young Woo Kang, Hyun Ho Park
wiley   +1 more source

Proving chaotic behaviour of CBC mode of operation [PDF]

open access: yes, 2015
International audienceThe cipher block chaining (CBC) block cipher mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting which is used in various applications.
Abidi, Abdessalem   +4 more
core   +5 more sources

A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins

open access: yesFEBS Letters, EarlyView.
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue   +6 more
wiley   +1 more source

HCTR+: An Optimally Secure TBC-Based Accordion Mode

open access: yesIACR Transactions on Symmetric Cryptology
The design of tweakable wide-block ciphers has advanced significantly over the past two decades. This evolution began with the wide-block cipher by Naor and Reingold.
Nilanjan Datta   +4 more
doaj   +1 more source

Block and Stream Ciphers and the Creatures in Between [PDF]

open access: yes, 2007
In this paper we define a notion of leak extraction from a block cipher. We demonstrate this new concept on an example of AES. A result is LEX: a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in ...
Biryukov, Alex
core   +1 more source

Targeting EZH2 reverses thyroid cell dedifferentiation and enhances iodide uptake in anaplastic thyroid cancer

open access: yesFEBS Letters, EarlyView.
Anaplastic thyroid cancer (ATC) lacks iodide uptake ability due to MAPK activation increasing the expression of the histone methyltransferase EZH2, which represses thyroid differentiation genes (TDGs) such as the sodium iodide symporter (NIS). Dual inhibition of MAPK (U0126) and EZH2 (EPZ6438/Tazemetostat) reverses this mechanism, thus restoring TDG ...
Diego Claro de Mello   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy