Results 61 to 70 of about 44,265 (336)

HCTR+: An Optimally Secure TBC-Based Accordion Mode

open access: yesIACR Transactions on Symmetric Cryptology
The design of tweakable wide-block ciphers has advanced significantly over the past two decades. This evolution began with the wide-block cipher by Naor and Reingold.
Nilanjan Datta   +4 more
doaj   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

Construction of diffusion layers based on cipher structures

open access: yes网络与信息安全学报, 2017
Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the ...
Peng-fei LI
doaj   +3 more sources

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

Design and Research of S-Box Based on Dynamic Strategy

open access: yesDianxin kexue, 2015
Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the ...
Zhouquan Du   +4 more
doaj   +2 more sources

Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure

open access: yesIEEE Access, 2019
In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design of block cipher.
Bo-Tao Liu   +4 more
doaj   +1 more source

Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer

open access: yesFEBS Letters, EarlyView.
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani   +4 more
wiley   +1 more source

New Methodology of Block Cipher Analysis using Chaos Game [PDF]

open access: yesITB Journal of Information and Communication Technology, 2011
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis. The method uses true random sequence concept as a reference for measuring randomness level of
Budi Sulistyo   +3 more
doaj  

Differential fault analysis on PRINTcipher

open access: yesIET Networks, 2013
The new block cipher PRINTcipher was introduced in CHES 2010 as a lightweight block cipher for ‘integrated circuit’ or IC‐‘printing’ technology. The key of PRINTcipher consist of two sub‐key components where the first sub‐key is ‘XORed’ to the state in ...
Nasour Bagheri   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy