Results 81 to 90 of about 2,386,676 (394)

Characteristics of the Kelch domain containing (KLHDC) subfamily and relationships with diseases

open access: yesFEBS Letters, EarlyView.
The Kelch protein superfamily includes 63 members, with the KLHDC subfamily having 10 proteins. While their functions are not fully understood, recent advances in KLHDC2's structure and role in protein degradation have highlighted its potential for drug development, especially in PROTAC therapies.
Courtney Pilcher   +6 more
wiley   +1 more source

Design and Research of S-Box Based on Dynamic Strategy

open access: yesDianxin kexue, 2015
Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the ...
Zhouquan Du   +4 more
doaj   +2 more sources

Differential fault analysis on PRINTcipher

open access: yesIET Networks, 2013
The new block cipher PRINTcipher was introduced in CHES 2010 as a lightweight block cipher for ‘integrated circuit’ or IC‐‘printing’ technology. The key of PRINTcipher consist of two sub‐key components where the first sub‐key is ‘XORed’ to the state in ...
Nasour Bagheri   +2 more
doaj   +1 more source

The apo LETM1 F‐EF‐hand adopts a closed conformation that underlies a multi‐modal sensory role in mitochondria

open access: yesFEBS Letters, EarlyView.
We present the first solution structure of the Ca2+‐depleted LETM1 F‐EF‐hand through a D676A/N678A Ca2+ binding‐deficient mutant, revealing a closed hydrophobic cleft caused by a unique F1‐helix pivot. The apo LETM1 F‐EF‐hand exhibits regiospecific hot and cold unfolding, sensitivity to physiological pH changes and potential for promiscuous heterotypic
Qi‐Tong Lin   +2 more
wiley   +1 more source

Deep Learning based Differential Distinguisher for Lightweight Block Ciphers [PDF]

open access: yesarXiv, 2021
Recent years have seen an increasing involvement of Deep Learning in the cryptanalysis of various ciphers. The present study is inspired by past works on differential distinguishers, to develop a Deep Neural Network-based differential distinguisher for round reduced lightweight block ciphers PRESENT and Simeck.
arxiv  

Balanced permutations Even-Mansour ciphers [PDF]

open access: yesCryptography, June 2017, volume 1, issue 1, article 2, 2014
The $r$-rounds Even-Mansour block cipher is a generalization of the well known Even-Mansour block cipher to $r$ iterations. Attacks on this construction were described by Nikoli\'c et al. and Dinur et al., for $r = 2, 3$. These attacks are only marginally better than brute force, but are based on an interesting observation (due to Nikoli\'c et al ...
arxiv   +1 more source

Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish [PDF]

open access: yes, 2020
Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill Cipher and ...
Haryono, Wasis
core   +1 more source

Distinct dysregulated pathways in sporadic and Lynch syndrome‐associated colorectal cancer offer insights for targeted treatment

open access: yesFEBS Letters, EarlyView.
This study explores the distinct molecular mechanisms underlying Lynch syndrome‐associated and sporadic colorectal cancer (CRC). By highlighting the therapeutic potential of targeting the PI3K‐Akt pathway in Lynch syndrome‐associated CRC and the Wnt pathway in sporadic CRC, the findings open avenues for personalised treatment strategies, aiming to ...
May J. Krause   +2 more
wiley   +1 more source

New Methodology of Block Cipher Analysis using Chaos Game [PDF]

open access: yesITB Journal of Information and Communication Technology, 2011
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis. The method uses true random sequence concept as a reference for measuring randomness level of
Budi Sulistyo   +3 more
doaj  

Block level cloud data deduplication scheme based on attribute encryption

open access: yes网络与信息安全学报, 2023
Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file ...
Wenting GE, Weihai LI, Nenghai YU
doaj   +1 more source

Home - About - Disclaimer - Privacy