Results 71 to 80 of about 2,410,295 (395)

Beyond quadratic speedups in quantum attacks on symmetric schemes [PDF]

open access: yesarXiv, 2021
In this paper, we report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only, with a more than quadratic time speedup compared to the best classical attack. We study the 2XOR-Cascade construction of Ga\v{z}i and Tessaro (EUROCRYPT~2012).
arxiv  

Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms

open access: yesFEBS Letters, EarlyView.
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze   +3 more
wiley   +1 more source

The intracellular domain of TLR2 is capable of high‐affinity Zn binding: possible outcomes for the receptor activation

open access: yesFEBS Letters, EarlyView.
Toll‐like receptors (TLRs) are important in the innate immune system. This study explores the zinc‐binding ability of the TLR2 TIR domain (TLR2TIR). We found that TLR2TIR binds zinc with nanomolar affinity through its cysteine residues. Two of them, C673 and C713, are vital for receptor activation, indicating that zinc may play a role in initiating ...
Vladislav A. Lushpa   +8 more
wiley   +1 more source

The power of microRNA regulation—insights into immunity and metabolism

open access: yesFEBS Letters, EarlyView.
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto   +2 more
wiley   +1 more source

Secure Algorithms for SAKA Protocol in the GSM Network [PDF]

open access: yes, 2017
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core   +1 more source

Construction of diffusion layers based on cipher structures

open access: yes网络与信息安全学报, 2017
Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the ...
Peng-fei LI
doaj   +3 more sources

Linear Key-schedule’s Properties of the Smallpresent Block Cipher

open access: yesБезопасность информационных технологий, 2013
SmallPresent block cipher was presented to investigate attacks on the PRESENT block cipher in details. In the paper the resistance to linear cryptanalysis of this cipher with arbitrary linear key-schedule is under consideration.
Georgy Igorevich Khoruzhenko   +1 more
doaj  

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Cryptology ePrint Archive, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
S. Sadeghi, Tahere Mohammadi, N. Bagheri
semanticscholar   +1 more source

Invariant Hopping Attacks on Block Ciphers [PDF]

open access: yesarXiv, 2020
Block ciphers are in widespread use since the 1970s. Their iterated structure is prone to numerous round invariant attacks for example in Linear Cryptanalysis (LC). The next step is to look at non-linear polynomial invariants cf. Eurocrypt'95. Until recently, researchers have found extremely few such attacks, with some impossibility results. Eventually
arxiv  

Identification of novel small molecule inhibitors of ETS transcription factors

open access: yesFEBS Letters, EarlyView.
ETS transcription factors play an essential role in tumourigenesis and are indispensable for sprouting angiogenesis, a hallmark of cancer, which fuels tumour expansion and dissemination. Thus, targeting ETS transcription factor function could represent an effective, multifaceted strategy to block tumour growth. The evolutionarily conserved E‐Twenty‐Six
Shaima Abdalla   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy