Results 1 to 10 of about 61,663 (241)

GPT-4 Is Too Smart To Be Safe: Stealthy Chat with LLMs via Cipher [PDF]

open access: yesInternational Conference on Learning Representations, 2023
Safety lies at the core of the development of Large Language Models (LLMs). There is ample work on aligning LLMs with human ethics and preferences, including data filtering in pretraining, supervised fine-tuning, reinforcement learning from human ...
Youliang Yuan   +6 more
semanticscholar   +1 more source

Unraveling synonymous and deep intronic variants causing aberrant splicing in two genetically undiagnosed epilepsy families

open access: yesBMC Medical Genomics, 2021
Background Variants identified through parent–child trio-WES yield up to 28–55% positive diagnostic rate across a variety of Mendelian disorders, there remain numerous patients who do not receive a genetic diagnosis.
Qiang Li   +5 more
doaj   +1 more source

A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System

open access: yesSensors, 2022
Hundreds of image encryption schemes have been conducted (as the literature review indicates). The majority of these schemes use pixels as building blocks for confusion and diffusion operations.
Muhammad Hanif   +8 more
doaj   +1 more source

Chaghri - A FHE-friendly Block Cipher

open access: yesConference on Computer and Communications Security, 2022
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
T. Ashur, M. Mahzoun, Dilara Toprakhisar
semanticscholar   +1 more source

Exon skipping caused by a complex structural variation in SH2D1A resulted in X‐linked lymphoproliferative syndrome type 1

open access: yesMolecular Genetics & Genomic Medicine, 2022
Background X‐linked lymphoproliferative syndrome type 1 (XLP1) is a rare primary immunodeficiency disorder characterized by severe immune dysregulation often after viral infection. It is caused by hemizygous mutations in the X‐linked SH2D1A gene.
Liwen Wu   +5 more
doaj   +1 more source

The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures

open access: yesIACR Cryptology ePrint Archive, 2021
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
G. Leander   +3 more
semanticscholar   +1 more source

KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message.
Maulidyah Lailatun Najah   +1 more
openaire   +2 more sources

A New Random Keys Generator Depend on Multi Techniques [PDF]

open access: yesEngineering and Technology Journal, 2015
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj   +1 more source

When an attacker meets a cipher-image in 2018: A Year in Review [PDF]

open access: yesJournal of Information Security and Applications, 2019
This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst. The most representative works
Chengqing Li
semanticscholar   +1 more source

Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]

open access: yesEngineering and Technology Journal, 2011
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj   +1 more source

Home - About - Disclaimer - Privacy