Results 51 to 60 of about 130,132 (369)

12 Ciphers

open access: yes, 2020
Another prime mover in the development of computers was cryptography – and in particular the breaking of German military codes during the second world war. It was this activity which really led to the modern computer era.
openaire   +2 more sources

Improved Related-Cipher Attack on Salsa20 Stream Cipher

open access: yesIEEE Access, 2019
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
L. Ding
semanticscholar   +1 more source

Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM

open access: yesFEBS Letters, EarlyView.
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley   +1 more source

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
doaj   +1 more source

The new normal? Redaction bias in biomedical science

open access: yesRoyal Society Open Science, 2021
A concerning amount of biomedical research is not reproducible. Unreliable results impede empirical progress in medical science, ultimately putting patients at risk.
David Robert Grimes, James Heathers
doaj   +1 more source

Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments

open access: yesEntropy, 2018
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
V. Ghafari, Honggang Hu
semanticscholar   +1 more source

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

Cows, clicks, ciphers, and satire

open access: yesNECSUS, 2015
The social network game Farmville, which allows players to grow crops, raise animals, and produce a variety of goods, proved enormously successful within a year of its launch in 2009, attracting 110 million Facebook users.
Tom Tyler
doaj   +1 more source

Application Research on Fuzzy Cognitive Map in Information Security Risk Assessment [PDF]

open access: yesJisuanji gongcheng, 2016
Since various types of information security risk assessment standards are too complex,as an alternative,most enterprises can only choose to do construction in accordance with safety standards in implementation.This always leads to a substantial gap that ...
CHEN Yu,WANG Yadi,WANG Jindong,WANG Na
doaj   +1 more source

Home - About - Disclaimer - Privacy