Results 111 to 120 of about 124,770 (378)

A note on some algebraic trapdoors for block ciphers

open access: yes, 2018
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core  

ANU: an ultra lightweight cipher design for security in IoT

open access: yesSecur. Commun. Networks, 2016
This paper proposes an ultra lightweight cipher ANU. ANU is a balanced Feistel-based network. ANU supports 64 bit plaintext and 128/80 bit key length, and it has total 25 rounds.
G. Bansod   +3 more
semanticscholar   +1 more source

Identification of functional and diverse circulating cancer‐associated fibroblasts in metastatic castration‐naïve prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink   +6 more
wiley   +1 more source

Inhibitor Petri Net that Executes an Arbitrary Given Markov Normal Algorithm

open access: yesМоделирование и анализ информационных систем, 2011
The inhibitor Petri net with a fixed structure that executes an arbitrary given Markov normal algorithm was constructed. The algorithm and its input string are encoded by nonnegative integer numbers and put into dedicated places of the Petri net which ...
D. A. Zaitsev
doaj  

THE DYNAMIC CIPHERS – NEW CONCEPT OF LONG-TERM CONTENT PROTECTING [PDF]

open access: yes
In the paper the original concept of a new cipher, targeted at this moment forcivil applications in technology (e.g. measurement and control systems) and business (e.g.content protecting, knowledge-based companies or long-term archiving systems) is ...
Grzegorz Szewczyk
core  

Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm

open access: yes, 2016
The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process.
Andysah Putera, Utama Siahaan, R. Rahim
semanticscholar   +1 more source

Clinical applications of next‐generation sequencing‐based ctDNA analyses in breast cancer: defining treatment targets and dynamic changes during disease progression

open access: yesMolecular Oncology, EarlyView.
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker   +14 more
wiley   +1 more source

ANOTHER BACONIAN CIPHER [PDF]

open access: green, 1909
WALTER W. GREG
openalex   +1 more source

WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices

open access: yesEAI Endorsed Trans. Security Safety, 2015
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch ...
Xinxin Fan, K. Mandal, G. Gong
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy