Results 101 to 110 of about 87,772 (336)
Security amplification by composition: The case of doubly-iterated, ideal ciphers [PDF]
William Aiello+3 more
openalex +3 more sources
Inhibitor Petri Net that Executes an Arbitrary Given Markov Normal Algorithm
The inhibitor Petri net with a fixed structure that executes an arbitrary given Markov normal algorithm was constructed. The algorithm and its input string are encoded by nonnegative integer numbers and put into dedicated places of the Petri net which ...
D. A. Zaitsev
doaj
Use of cipher and cipher-key in carbohydrate nomenclature
Department of Chemistry, Jadavpur University, Kolkata-700 032, India E-mail : ghoshrina@yahoo.com Manuscript received 27 January 2009, revised 19 May 2009, accepted 19 May 2009 The steric structures of the carbohydrates and related compounds have been concised and generalised through a proposed cipher and cipher-key to make the study easier.
Amalendu Banerjee+2 more
openaire +2 more sources
Mutations in the C9orf72 gene represent the most common genetic cause of amyotrophic lateral sclerosis (ALS), a fatal neurodegenerative disease. Using patient‐derived neurons and C. elegans models, we find that the nucleoporin Nup107 is dysregulated in C9orf72‐associated ALS. Conversely, reducing Nup107 levels mitigates disease‐related changes.
Saygın Bilican+7 more
wiley +1 more source
Comparative Study between Stream Cipher and Block Cipher using RC4 and Hill Cipher
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to find the two keys using cryptanalysis method, that is used for encrypting the information ...
Shish Ahmad+4 more
openaire +2 more sources
Single‐cell RNA sequencing reveals an opposite role of SLPI in basal tumors based on metastatic spread, along with shared activation of specific regulons in cancer cells and mature luminal lactocytes, as well as downregulation of MALAT1 and NEAT1 in the latter.
Pietro Ancona+4 more
wiley +1 more source
Association between magnetic field exposure and miscarriage risk is not supported by the data
David Robert Grimes, James Heathers
doaj +1 more source
The dynamics of the CBC Mode of Operation
In cryptography, the Cipher Block Chaining (CBC), one of the most commonly used mode in recent years, is a mode of operation that uses a block cipher to provide confidentiality or authenticity.
Abidi, Abdessalem+4 more
core +1 more source
An application of the theory of permutations in breaking the Enigma cipher [PDF]
Marian Rejewski
openalex +1 more source