Results 51 to 60 of about 91,976 (334)
Abstrak. Kriptografi polyalphabetic merupakan improvisasi dari teknik substitusi monoalphabetic. Polyalphabetic substitution chiper melakukan teknik kriptografi monoalphabetic satu kali proses untuk suatu plainteks pesan.
Yurika Permanasari, Erwin Harahap
doaj +1 more source
Modern and Lightweight Component-based Symmetric Cipher Algorithms
Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats.
Samar A. Qassir +2 more
doaj +1 more source
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser +6 more
wiley +1 more source
Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka +3 more
doaj +1 more source
Fast software encryption system based on local pseudorandomness [PDF]
New software-oriented single key cryptosystem based on local pseudorandomness is considered. Its cryptorobustness is characterized in probabilistic terms.
A. Moldovyan , N. Moldovyan
doaj
A de novo variant of BICRA results in Coffin–Siris syndrome 12
Background BICRA, a transcript regulator, was identified as the genetic factor of Coffin–Siris syndrome 12 (CSS12) recently, which was characterized by diverse neurodevelopmental delays.
Youquan Tu +5 more
doaj +1 more source
Eliminating Variables in Boolean Equation Systems [PDF]
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar +3 more
core +1 more source
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez +13 more
wiley +1 more source
Objectives To use routinely collected datasets and data linkage to identify patterns of healthcare utilisation by children and young people (CYP) with adolescent mental health (AMH) disorders across the four UK Nations, with a particular focus on self ...
Sophie Wood +4 more
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liskov, Moses +2 more
openaire +4 more sources

