Results 61 to 70 of about 2,395,070 (371)
A Traceable Block Cipher [PDF]
In this paper we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys providing distinct descriptions of the same instance of the block cipher. But it is computationally difficult, given one or even up to k equivalent keys, to recover the so called ...
Henri Gilbert, Olivier Billet
openaire +2 more sources
Compact Implementations of HIGHT Block Cipher on IoT Platforms
Recent lightweight block cipher competition (FELICS Triathlon) evaluates efficient implementations of block ciphers for Internet of things (IoT) environment.
B. Kim+4 more
semanticscholar +1 more source
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu+17 more
wiley +1 more source
Single Key Variant of PMAC_Plus
At CRYPTO 2011, Yasuda proposed the PMAC_Plus message authentication code based on an n-bit block cipher. Its design principle inherits the well known PMAC parallel network with a low additional cost.
Nilanjan Datta+4 more
doaj +1 more source
On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat+4 more
core +6 more sources
Modified forms of cipher block chaining
A long-standing proposal for modifying cipher block chaining to prevent data expansion is shown to be insecure in some circumstances. Different modifications are then presented which appear secure.
Mitchell, Chris J, Varadharajan, Vijay
openaire +4 more sources
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of software exploitation, and the construction of ...
R. Avanzi
semanticscholar +1 more source
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan+2 more
wiley +1 more source
Proving chaotic behaviour of CBC mode of operation [PDF]
International audienceThe cipher block chaining (CBC) block cipher mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting which is used in various applications.
Abidi, Abdessalem+4 more
core +5 more sources
ERBIN limits epithelial cell plasticity via suppression of TGF‐β signaling
In breast and lung cancer patients, low ERBIN expression correlates with poor clinical outcomes. Here, we show that ERBIN inhibits TGF‐β‐induced epithelial‐to‐mesenchymal transition in NMuMG breast and A549 lung adenocarcinoma cell lines. ERBIN suppresses TGF‐β/SMAD signaling and reduces TGF‐β‐induced ERK phosphorylation.
Chao Li+3 more
wiley +1 more source