Results 111 to 120 of about 963,035 (329)

Emerging role of ARHGAP29 in melanoma cell phenotype switching

open access: yesMolecular Oncology, EarlyView.
This study gives first insights into the role of ARHGAP29 in malignant melanoma. ARHGAP29 was revealed to be connected to tumor cell plasticity, promoting a mesenchymal‐like, invasive phenotype and driving tumor progression. Further, it modulates cell spreading by influencing RhoA/ROCK signaling and affects SMAD2 activity. Rho GTPase‐activating protein
Beatrice Charlotte Tröster   +3 more
wiley   +1 more source

On the Performance and Security of Multiplication in GF(2N)

open access: yesCryptography, 2018
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger   +8 more
doaj   +1 more source

Inhibition of CDK9 enhances AML cell death induced by combined venetoclax and azacitidine

open access: yesMolecular Oncology, EarlyView.
The CDK9 inhibitor AZD4573 downregulates c‐MYC and MCL‐1 to induce death of cytarabine (AraC)‐resistant AML cells. This enhances VEN + AZA‐induced cell death significantly more than any combination of two of the three drugs in AraC‐resistant AML cells.
Shuangshuang Wu   +18 more
wiley   +1 more source

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Hash function based on arithmetic coding and public-key cryptography [PDF]

open access: green, 2010
René Ndoundam   +2 more
openalex   +1 more source

Code-based cryptography

open access: yes, 2018
As the threat of building quantum computers which would break most of the used ciphers increases, so does the interest in an alternative solution. In the first part of this thesis, we consider Goppa codes which are error-correcting codes used in some post-quantum cryptosystems.
openaire   +1 more source

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM [PDF]

open access: yesJournal of Engineering Science and Technology, 2015
A novel implementation of code based cryptography (Cryptocoding) technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys.
B. SENTHILKUMAR, V. RAJAMANI
doaj  

Home - About - Disclaimer - Privacy