Results 51 to 60 of about 87,772 (336)

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

WATERMARKING CIPHERS [PDF]

open access: yesPrikladnaya diskretnaya matematika, 2015
In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext x by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text x/ containing a ...
openaire   +4 more sources

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

«The black room» the Russian foreign Ministry against Napoleon

open access: yesVestnik MGIMO-Universiteta, 2012
This article deals with the successful activity of the Russian Empire cryptographers against Napoleon and his troops. Also some organizational work aspects of interception of French army cipher messages are considered.
D. E. Larin
doaj   +1 more source

Eliminating Variables in Boolean Equation Systems [PDF]

open access: yes, 2017
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar   +3 more
core   +1 more source

Homozygous variant of MLC1 results in megalencephalic leukoencephalopathy with subcortical cysts

open access: yesMolecular Genetics & Genomic Medicine
Background Megalencephalic leukoencephalopathy with subcortical cysts (MLC) is a rare, inherited disorder that causes epilepsy, intellectual disorders, and early onset macrocephaly. MLC1 has been identified as a main pathogenic gene.
Jian Zha   +8 more
doaj   +1 more source

Length-Doubling Ciphers and Tweakable Ciphers [PDF]

open access: yes, 2012
We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcipher into a variable-input-length cipher (resp., tweakable cipher) that acts on strings of [n..2n−1] bits. Both HEM and THEM are simple and intuitive and use only two blockcipher calls, while prior work at least takes three.
openaire   +2 more sources

Intron‐oriented HTLV‐1 integration in an adult T‐cell leukemia/lymphoma cell line sustains expression of intact ift81 mRNA

open access: yesFEBS Letters, EarlyView.
In the adult T‐cell leukemia/lymphoma (ATL) cell line ED, the human T‐cell leukemia virus type 1 (HTLV‐1) provirus was integrated into the intron of the ift81 gene in the antisense orientation. Despite this integration, both the intact ift81 and the viral oncogene hbz were simultaneously expressed, likely due to the functional insufficiency of viral ...
Mayuko Yagi   +5 more
wiley   +1 more source

Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature

open access: yesApplied Sciences
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka   +3 more
doaj   +1 more source

Fast software encryption system based on local pseudorandomness [PDF]

open access: yesComputer Science Journal of Moldova, 1996
New software-oriented single key cryptosystem based on local pseudorandomness is considered. Its cryptorobustness is characterized in probabilistic terms.
A. Moldovyan , N. Moldovyan
doaj  

Home - About - Disclaimer - Privacy