Results 61 to 70 of about 87,772 (336)

On construction of perfect ciphers

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2014
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj   +1 more source

Novel GRIA2 variant in a patient with atypical autism spectrum disorder and psychiatric symptoms: a case report

open access: yesBMC Pediatrics, 2022
Background As sequencing technology has advanced in recent years, a series of synapse-related gene variants have been reported to be associated with autism spectrum disorders (ASDs).
Qianyun Cai   +6 more
doaj   +1 more source

A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]

open access: yes, 2012
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core   +1 more source

The game of cipher beads

open access: yesJournal of Applied and Industrial Mathematics, 2009
Comparison between the various impact factors of a few Russian journals demonstrates the deficiencies of the popular citation indices.
openaire   +3 more sources

The epithelial barrier theory proposes a comprehensive explanation for the origins of allergic and other chronic noncommunicable diseases

open access: yesFEBS Letters, EarlyView.
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu   +17 more
wiley   +1 more source

Information Security of Soviet Partisans and Underground during World War II

open access: yesБезопасность информационных технологий, 2011
This article deals with the ciphers and some other methods of data protection and communication means used by the soviet partisans during World War II.
D. A. Larin
doaj  

MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features

open access: yesIEEE Access, 2019
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fastest
Rahul Saha   +4 more
doaj   +1 more source

The Engima Cipher Machine [PDF]

open access: yes, 2012
There can be little doubt that the German “Enigma” was the best and safest mechanical cipher machine available in any country at the outbreak of the Second World War.
Wilson, Tony
core   +1 more source

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

Феномен кода и проблема коммуникации в музыке XX века

open access: yesВестник музыкальной науки, 2018
Предметом исследования в статье является феномен кода, рассматриваемый в контексте музыкальной коммуникации XX столетия. Актуальность темы не вызывает сомнения, поскольку она связана с малоисследованной областью современного музыкознания.
Юферова, Ольга Александровна
doaj   +1 more source

Home - About - Disclaimer - Privacy