Results 1 to 10 of about 89,548 (287)

Unraveling synonymous and deep intronic variants causing aberrant splicing in two genetically undiagnosed epilepsy families

open access: yesBMC Medical Genomics, 2021
Background Variants identified through parent–child trio-WES yield up to 28–55% positive diagnostic rate across a variety of Mendelian disorders, there remain numerous patients who do not receive a genetic diagnosis.
Qiang Li   +5 more
doaj   +1 more source

Exon skipping caused by a complex structural variation in SH2D1A resulted in X‐linked lymphoproliferative syndrome type 1

open access: yesMolecular Genetics & Genomic Medicine, 2022
Background X‐linked lymphoproliferative syndrome type 1 (XLP1) is a rare primary immunodeficiency disorder characterized by severe immune dysregulation often after viral infection. It is caused by hemizygous mutations in the X‐linked SH2D1A gene.
Liwen Wu   +5 more
doaj   +1 more source

A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System

open access: yesSensors, 2022
Hundreds of image encryption schemes have been conducted (as the literature review indicates). The majority of these schemes use pixels as building blocks for confusion and diffusion operations.
Muhammad Hanif   +8 more
doaj   +1 more source

A New Random Keys Generator Depend on Multi Techniques [PDF]

open access: yesEngineering and Technology Journal, 2015
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj   +1 more source

New Technique using Fibonacci Matrices with Play-Fair System in Cryptography

open access: yesTikrit Journal of Pure Science, 2022
In this paper we introduce a new Technique, this technique depends on the Fibonacci sequence and Fibonacci Matrices with a Play- Fair which is one of the cryptography systems.
Awni M.Gaftan   +2 more
doaj   +1 more source

Evolusi Cipher Vigenere dalam Peningkatan Pengamanan Informasi

open access: yesJurnal informatika UPGRIS, 2021
Pertukaran informasi melalui ruang publik masih menyisakan kerentanan keamanan, sehingga perlu mekanisme pengamanan melalui proses kriptografi. Salah satu model kriptografi yang dapat bertahan hingga lebih dari 300 tahun adalah Vigenere Cipher, sebelum ...
Eka Ardhianto   +3 more
doaj   +1 more source

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

open access: yesApplied Sciences, 2022
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect
Muhammad Nadeem   +7 more
doaj   +1 more source

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [PDF]

open access: yes, 2005
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosen-plaintext attacks, and points out that this ...
B. Schneier   +5 more
core   +5 more sources

Deciphering a novel image cipher based on mixed transformed Logistic maps [PDF]

open access: yes, 2015
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based
Cheng, Ge   +4 more
core   +1 more source

How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]

open access: yes, 2001
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy