Results 61 to 70 of about 87,772 (336)
On construction of perfect ciphers
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj +1 more source
Background As sequencing technology has advanced in recent years, a series of synapse-related gene variants have been reported to be associated with autism spectrum disorders (ASDs).
Qianyun Cai+6 more
doaj +1 more source
A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core +1 more source
Comparison between the various impact factors of a few Russian journals demonstrates the deficiencies of the popular citation indices.
openaire +3 more sources
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu+17 more
wiley +1 more source
Information Security of Soviet Partisans and Underground during World War II
This article deals with the ciphers and some other methods of data protection and communication means used by the soviet partisans during World War II.
D. A. Larin
doaj
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fastest
Rahul Saha+4 more
doaj +1 more source
The Engima Cipher Machine [PDF]
There can be little doubt that the German “Enigma” was the best and safest mechanical cipher machine available in any country at the outbreak of the Second World War.
Wilson, Tony
core +1 more source
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan+2 more
wiley +1 more source
Феномен кода и проблема коммуникации в музыке XX века
Предметом исследования в статье является феномен кода, рассматриваемый в контексте музыкальной коммуникации XX столетия. Актуальность темы не вызывает сомнения, поскольку она связана с малоисследованной областью современного музыкознания.
Юферова, Ольга Александровна
doaj +1 more source