Results 111 to 120 of about 124,770 (378)
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core
ANU: an ultra lightweight cipher design for security in IoT
This paper proposes an ultra lightweight cipher ANU. ANU is a balanced Feistel-based network. ANU supports 64 bit plaintext and 128/80 bit key length, and it has total 25 rounds.
G. Bansod+3 more
semanticscholar +1 more source
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink+6 more
wiley +1 more source
Association between magnetic field exposure and miscarriage risk is not supported by the data
David Robert Grimes, James Heathers
doaj +1 more source
Inhibitor Petri Net that Executes an Arbitrary Given Markov Normal Algorithm
The inhibitor Petri net with a fixed structure that executes an arbitrary given Markov normal algorithm was constructed. The algorithm and its input string are encoded by nonnegative integer numbers and put into dedicated places of the Petri net which ...
D. A. Zaitsev
doaj
THE DYNAMIC CIPHERS – NEW CONCEPT OF LONG-TERM CONTENT PROTECTING [PDF]
In the paper the original concept of a new cipher, targeted at this moment forcivil applications in technology (e.g. measurement and control systems) and business (e.g.content protecting, knowledge-based companies or long-term archiving systems) is ...
Grzegorz Szewczyk
core
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process.
Andysah Putera, Utama Siahaan, R. Rahim
semanticscholar +1 more source
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker+14 more
wiley +1 more source
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch ...
Xinxin Fan, K. Mandal, G. Gong
semanticscholar +1 more source