Results 21 to 30 of about 1,954 (70)
On construction of perfect ciphers
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj +1 more source
Феномен кода и проблема коммуникации в музыке XX века
Предметом исследования в статье является феномен кода, рассматриваемый в контексте музыкальной коммуникации XX столетия. Актуальность темы не вызывает сомнения, поскольку она связана с малоисследованной областью современного музыкознания.
Юферова, Ольга Александровна
doaj +1 more source
Homozygous variant of MLC1 results in megalencephalic leukoencephalopathy with subcortical cysts
Background Megalencephalic leukoencephalopathy with subcortical cysts (MLC) is a rare, inherited disorder that causes epilepsy, intellectual disorders, and early onset macrocephaly. MLC1 has been identified as a main pathogenic gene.
Jian Zha+8 more
doaj +1 more source
Modern and Lightweight Component-based Symmetric Cipher Algorithms
Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats.
Samar A. Qassir+2 more
doaj +1 more source
A de novo variant of BICRA results in Coffin–Siris syndrome 12
Background BICRA, a transcript regulator, was identified as the genetic factor of Coffin–Siris syndrome 12 (CSS12) recently, which was characterized by diverse neurodevelopmental delays.
Youquan Tu+5 more
doaj +1 more source
Background As sequencing technology has advanced in recent years, a series of synapse-related gene variants have been reported to be associated with autism spectrum disorders (ASDs).
Qianyun Cai+6 more
doaj +1 more source
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous.
Sa’ed Abed+3 more
doaj +1 more source
KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by ...
Maulidyah Lailatun Najah+1 more
doaj +1 more source
A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara+3 more
doaj +1 more source
Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka+3 more
doaj +1 more source