Results 241 to 250 of about 124,770 (378)
Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements. [PDF]
Cowley A+5 more
europepmc +1 more source
Recommendation for block cipher modes of operation :
Morris J. Dworkin
openalex +1 more source
A nucleotide‐independent, pan‐RAS‐targeted DARPin elicits anti‐tumor activity in a multimodal manner
We report a Designed Ankyrin Repeat Protein that binds and inhibits RAS proteins, which serve as central cell signaling hubs and are essential for the progression of many cancers. Its unique feature is that it does not discriminate between different RAS isoforms or mutations and is capable of binding to RAS in both its active (GTP‐bound) and inactive ...
Jonas N. Kapp+13 more
wiley +1 more source
Quantum Stream Cipher Based on Holevo-Yuen Theory: Part II. [PDF]
Hirota O, Sohma M.
europepmc +1 more source
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds [PDF]
Taizo Shirai, Bart Preneel
openalex +1 more source
C–C chemokine receptor type 9 (CCR9) is an immune checkpoint in pancreatic ductal adenocarcinoma (PDAC). Novel anti‐CCR9 antibody SRB2 was evaluated in combination with cytotoxic chemotherapy in PDAC cells, patient‐derived organoids, patient‐derived xenografts, and humanized mouse models.
Hannah G. McDonald+18 more
wiley +1 more source
Universal Encryption of Individual Sequences Under Maximal Information Leakage. [PDF]
Merhav N.
europepmc +1 more source
The algebraic structure of the set of enciphering trans formations of a pure cipher is analysed. An alternative definition of pure ciphers is given and necessary and sufficient conditions for the product of two pure ciphers to be pure is found.
openaire +1 more source