Results 171 to 180 of about 87,772 (336)
Guesswork and Variation Distance as Measures of Cipher Security
John O. Pliam
openalex +1 more source
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers [PDF]
John O. Pliam
openalex +1 more source
Analysis of treatment‐naïve high‐grade serous ovarian carcinoma (HGSOC) and control tissues for ERVs, LINE‐1 (L1), inflammation, and immune checkpoints identified five clusters with diverse patient recurrence‐free survivals. An inflammation score was calculated and correlated with retroelement expression, where one novel cluster (Triple‐I) with high ...
Laura Glossner+6 more
wiley +1 more source
Deep learning-based profiling side-channel attacks in SPECK cipher. [PDF]
Hameed F, Alkhzaimi H.
europepmc +1 more source
Cotargeting EGFR and STAT3 with Erlotinib and TTI‐101 impairs both 2D and 3D growth of ETV1‐overexpressing prostate cancer cells by disrupting a self‐sustaining ETV1–EGFR positive feedback loop that promotes EGFR and STAT3 expression and phosphorylation (activation).
Elsa Gomes Paiva+5 more
wiley +1 more source
Machine learning on multiple epigenetic features reveals H3K27Ac as a driver of gene expression prediction across patients with glioblastoma. [PDF]
Suita Y+6 more
europepmc +1 more source
Human cytomegalovirus infection is common in normal prostate epithelium, prostate tumor tissue, and prostate cancer cell lines. CMV promotes cell survival, proliferation, and androgen receptor signaling. Anti‐CMV pharmaceutical compounds in clinical use inhibited cell expansion in prostate cancer models in vitro and in vivo, motivating investigation ...
Johanna Classon+13 more
wiley +1 more source
In thyroid cancer patients, high‐dose (≥7.4 GBq) radioactive iodine therapy (RAIT) was associated with a higher prevalence of clonal hematopoiesis (variant allele frequency >2%) in individuals aged ≥50 years (OR = 2.44). In silico analyses showed that truncating PPM1D mutations conferred a selective advantage under these conditions.
Jaeryuk Kim+11 more
wiley +1 more source
Hyperchaotic color image encryption using eight-base DNA complementary rules and extended Zigzag transform. [PDF]
Yang B.
europepmc +1 more source
A cipher based on data-dependent permutations [PDF]
A. A. Moldovyan, N. A. Moldovyan
openalex +1 more source