Results 51 to 60 of about 87,772 (336)
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson+45 more
core +1 more source
In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext x by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text x/ containing a ...
openaire +4 more sources
A stepwise emergence of evolution in the RNA world
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley +1 more source
«The black room» the Russian foreign Ministry against Napoleon
This article deals with the successful activity of the Russian Empire cryptographers against Napoleon and his troops. Also some organizational work aspects of interception of French army cipher messages are considered.
D. E. Larin
doaj +1 more source
Eliminating Variables in Boolean Equation Systems [PDF]
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar+3 more
core +1 more source
Homozygous variant of MLC1 results in megalencephalic leukoencephalopathy with subcortical cysts
Background Megalencephalic leukoencephalopathy with subcortical cysts (MLC) is a rare, inherited disorder that causes epilepsy, intellectual disorders, and early onset macrocephaly. MLC1 has been identified as a main pathogenic gene.
Jian Zha+8 more
doaj +1 more source
Length-Doubling Ciphers and Tweakable Ciphers [PDF]
We motivate and describe a mode of operation HEM (resp., THEM) that turns a n-bit blockcipher into a variable-input-length cipher (resp., tweakable cipher) that acts on strings of [n..2n−1] bits. Both HEM and THEM are simple and intuitive and use only two blockcipher calls, while prior work at least takes three.
openaire +2 more sources
In the adult T‐cell leukemia/lymphoma (ATL) cell line ED, the human T‐cell leukemia virus type 1 (HTLV‐1) provirus was integrated into the intron of the ift81 gene in the antisense orientation. Despite this integration, both the intact ift81 and the viral oncogene hbz were simultaneously expressed, likely due to the functional insufficiency of viral ...
Mayuko Yagi+5 more
wiley +1 more source
Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka+3 more
doaj +1 more source
Fast software encryption system based on local pseudorandomness [PDF]
New software-oriented single key cryptosystem based on local pseudorandomness is considered. Its cryptorobustness is characterized in probabilistic terms.
A. Moldovyan , N. Moldovyan
doaj