Results 61 to 70 of about 130,132 (369)
Plasmodium falciparum gametogenesis essential protein 1 (GEP1) is a transmission‐blocking target
This study shows Plasmodium falciparum GEP1 is vital for activating sexual stages of malarial parasites even independently of a mosquito factor. Knockout parasites completely fail gamete formation even when a phosphodiesterase inhibitor is added. Two single‐nucleotide polymorphisms (V241L and S263P) are found in 12%–20% of field samples.
Frederik Huppertz +5 more
wiley +1 more source
«The black room» the Russian foreign Ministry against Napoleon
This article deals with the successful activity of the Russian Empire cryptographers against Napoleon and his troops. Also some organizational work aspects of interception of French army cipher messages are considered.
D. E. Larin
doaj +1 more source
Eliminating Variables in Boolean Equation Systems [PDF]
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar +3 more
core +1 more source
Angiotensin II (AngII), a neuropeptide, interacts with amyloid‐β (Aβ), a key player in Alzheimer's disease. This study reveals that AngII reduces Aβ aggregation and membrane disruption in vitro. Biophysical assays and molecular modeling suggest AngII binds disordered Aβ forms, potentially modulating early amyloidogenic events and contributing to ...
Mohsen Habibnia +5 more
wiley +1 more source
Homozygous variant of MLC1 results in megalencephalic leukoencephalopathy with subcortical cysts
Background Megalencephalic leukoencephalopathy with subcortical cysts (MLC) is a rare, inherited disorder that causes epilepsy, intellectual disorders, and early onset macrocephaly. MLC1 has been identified as a main pathogenic gene.
Jian Zha +8 more
doaj +1 more source
A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core +1 more source
Quantum Noise Randomized Ciphers
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom +13 more
core +1 more source
Boolean functions with restricted input and their robustness; application to the FLIP cipher
We study the main cryptographic features of Boolean functions (balanced-ness, nonlinearity, algebraic immunity) when, for a given number n of variables, the input to these functions is restricted to some subset E of F n 2. We study in particular the case
C. Carlet, Pierrick Méaux, Yann Rotella
semanticscholar +1 more source
Atovaquone is an antimalarial requiring potentiation for sufficient efficacy. We pursued strategies to enhance its activity, showing that 4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase, decreasing ubiquinone biosynthesis. Since atovaquone competes with ubiquinol in mitochondria, 4‐nitrobenzoate facilitates its action, potentiating ...
Ignasi Bofill Verdaguer +7 more
wiley +1 more source
Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka +3 more
doaj +1 more source

