Mitigating side channel attacks on FPGA through deep learning and dynamic partial reconfiguration. [PDF]
Bommana SR+3 more
europepmc +1 more source
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)
Paul Camion+2 more
openalex +1 more source
Using multi‐omic characterization, we aimed to identify key regulators specific to squamous cell lung carcinoma (SqCC). SqCC‐specific differentially expressed genes were integrated with metabolics data. High expression of the creatine transporter SLC6A8, along with elevated creatine levels, appeared to be a distinct metabolic feature of SqCC.
Johan Staaf+10 more
wiley +1 more source
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach. [PDF]
Negi D, Kumar R, Kumar V, Dhaka A.
europepmc +1 more source
Novel method of discrete message ciphering with equal length of message and cryptogram
Miloš Bandjur
openalex +2 more sources
Identifying prognostic targets in metastatic prostate cancer beyond AR
Genome‐wide functional screens combined with a large gene expression database and clinical outcomes can identify new therapeutic vulnerabilities in prostate cancer. Eight potentially druggable targets demonstrated strong dependency in cell lines, were associated with worse prognosis clinically, and showed evidence of protein expression in prostate ...
Emily Feng+13 more
wiley +1 more source
A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map. [PDF]
Tao Y, Cui W, Wang S, Wang Y.
europepmc +1 more source
Current trends in single‐cell RNA sequencing applications in diabetes mellitus
Single‐cell RNA sequencing is a powerful approach to decipher the cellular and molecular landscape at a single‐cell resolution. The rapid development of this technology has led to a wide range of applications, including the detection of cellular and molecular mechanisms and the identification and introduction of novel potential diagnostic and ...
Seyed Sajjad Zadian+6 more
wiley +1 more source
IAESR: IoT-oriented authenticated encryption based on iShadow round function. [PDF]
Zhang Y+5 more
europepmc +1 more source
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)
Duong Hieu Phan, David Pointcheval
openalex +1 more source