Results 81 to 90 of about 124,770 (378)

KRIPTOGRAFI DENGAN KOMPOSISI CAESAR CIPHER DAN AFFINE CIPHER UNTUK MENGUBAH PESAN RAHASIA [PDF]

open access: yes, 2016
Kriptografi caesar cipher dan affine cipher adalah kriptografi yang sederhana dan mudah dipecahkan. Salah satu cara agar pesan menjadi sulit dipecahkan yaitu dengan cara mengkomposisi kedua cipher tersebut. Komposisi kriptografi caesar cipher dan affine
Wijaya, Muhammad Lutfi
core  

BREAKING LITTLEWOOD'S CIPHER

open access: yesCryptologia, 2004
In 1953, the celebrated mathematician John Edensor Littlewood proposed a stream cipher based on logarithm tables. Fifty years later, we propose the first analysis of his scheme. Littlewood suggests the idea of using real functions as tools to build cryptographic primitives.
openaire   +4 more sources

Modifications in FLAP's second cytosolic loop influence 5‐LOX interaction, inhibitor binding, and leukotriene formation

open access: yesFEBS Letters, EarlyView.
The enzyme 5‐lipoxygenase (5‐LOX) catalyzes the first step in the biosynthesis of leukotrienes (LTs) involved in inflammatory pathophysiology. After cellular stimulation, 5‐LOX translocates to the nucleus, interacting with the 5‐LOX‐activating protein (FLAP) to form LTA4 from arachidonic acid (AA).
Erik Romp   +5 more
wiley   +1 more source

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
doaj   +1 more source

Eliminating Variables in Boolean Equation Systems [PDF]

open access: yes, 2017
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar   +3 more
core   +1 more source

Brucella NyxA and NyxB dimerization enhances effector function during infection

open access: yesFEBS Letters, EarlyView.
Brucella abortus thrives inside cells thanks to the translocation of effector proteins that fine‐tune cellular functions. NyxA and NyxB are two effectors that destabilize the nucleolar localization of their host target, SENP3. We show that the Nyx proteins directly interact with each other and that their dimerization is essential for their function ...
Lison Cancade‐Veyre   +4 more
wiley   +1 more source

The carboxylate “gripper” of the substrate is critical for C‐4 stereo‐inversion by UDP‐glucuronic acid 4‐epimerase

open access: yesFEBS Letters, EarlyView.
UDP‐glucuronic acid 4‐epimerase (UGAepi) catalyzes NAD+‐dependent interconversion of UDP‐glucuronic acid (UDP‐GlcA) and UDP‐galacturonic acid (UDP‐GalA) via C4‐oxidation, 4‐keto‐intermediate rotation, and C4‐reduction. Here, Borg et al. examined the role of the substrate's carboxylate group in the enzymic mechanism by analyzing NADH‐dependent reduction
Annika J. E. Borg   +2 more
wiley   +1 more source

Implementing Knowledge Translation Strategies in Funded Research in Canada and Australia: A Case Study

open access: yesTechnology Innovation Management Review, 2016
There is an emerging literature describing the use of knowledge translation strategies to increase the relevance and usability of research, yet there are few real-world examples of how this works in practice. This case study reports on the steps taken to
Gabriel Moore   +5 more
doaj  

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

The Engima Cipher Machine [PDF]

open access: yes, 2012
There can be little doubt that the German “Enigma” was the best and safest mechanical cipher machine available in any country at the outbreak of the Second World War.
Wilson, Tony
core   +1 more source

Home - About - Disclaimer - Privacy