Results 51 to 60 of about 2,414,614 (286)

Biophysical analysis of angiotensin II and amyloid‐β cross‐interaction in aggregation and membrane disruption

open access: yesFEBS Letters, EarlyView.
Angiotensin II (AngII), a neuropeptide, interacts with amyloid‐β (Aβ), a key player in Alzheimer's disease. This study reveals that AngII reduces Aβ aggregation and membrane disruption in vitro. Biophysical assays and molecular modeling suggest AngII binds disordered Aβ forms, potentially modulating early amyloidogenic events and contributing to ...
Mohsen Habibnia   +5 more
wiley   +1 more source

A Review of Block Ciphers and Its Post-Quantum Considerations

open access: yesIEEE Access
Recent advances in cryptography aim to address threats posed by quantum computers. However, these advances have focused disproportionately on asymmetric schemes, while symmetric primitives like block ciphers have received less attention.
R. V. Chethana   +3 more
doaj   +1 more source

Single Key Variant of PMAC_Plus

open access: yesIACR Transactions on Symmetric Cryptology, 2017
At CRYPTO 2011, Yasuda proposed the PMAC_Plus message authentication code based on an n-bit block cipher. Its design principle inherits the well known PMAC parallel network with a low additional cost.
Nilanjan Datta   +4 more
doaj   +1 more source

BRISK: Dynamic Encryption Based Cipher for Long Term Security

open access: yesSensors, 2021
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal.
Ashutosh Dhar Dwivedi
doaj   +1 more source

Proving chaotic behaviour of CBC mode of operation [PDF]

open access: yes, 2015
International audienceThe cipher block chaining (CBC) block cipher mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting which is used in various applications.
Abidi, Abdessalem   +4 more
core   +5 more sources

Compact Implementations of HIGHT Block Cipher on IoT Platforms

open access: yesSecur. Commun. Networks, 2019
Recent lightweight block cipher competition (FELICS Triathlon) evaluates efficient implementations of block ciphers for Internet of things (IoT) environment.
B. Kim   +4 more
semanticscholar   +1 more source

4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase in malaria parasites and enhances atovaquone efficacy

open access: yesFEBS Letters, EarlyView.
Atovaquone is an antimalarial requiring potentiation for sufficient efficacy. We pursued strategies to enhance its activity, showing that 4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase, decreasing ubiquinone biosynthesis. Since atovaquone competes with ubiquinol in mitochondria, 4‐nitrobenzoate facilitates its action, potentiating ...
Ignasi Bofill Verdaguer   +7 more
wiley   +1 more source

Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images

open access: yes, 2007
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption ...
Ahmed, Hossam El-din Hussien   +6 more
core   +1 more source

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of software exploitation, and the construction of ...
R. Avanzi
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy