Results 91 to 100 of about 11,604 (291)
Cryptanalysis of 48-step RIPEMD-160
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj +1 more source
Rapid Proteome‐Wide Discovery of Protein–Protein Interactions With ppIRIS
ppIRIS is a lightweight deep learning framework for proteome‐wide protein–protein interaction prediction directly from sequence. By fusing evolutionary and structural embeddings with a regularized Siamese architecture, ppIRIS achieves state‐of‐the‐art accuracy across species, enables minute‐scale screening, and reveals biologically validated bacterial ...
Luiz Felipe Piochi +4 more
wiley +1 more source
Preimage and collision attacks on reduced Ascon using algebraic strategies
Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of the NIST Lightweight Cryptography Project. In this paper, we propose an improved preimage attack against 2-round Ascon-XOF-64 with a complexity of $$2^{33}$
Qinggan Fu +3 more
doaj +1 more source
Quantum Random Oracle Model for Quantum Public-Key Encryption
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj +1 more source
Urinary Fusobacterium nucleatum–derived outer membrane vesicles are shown to promote bladder cancer lymphatic metastasis. The vesicle protein FomA activates TLR2/NF‐κB signaling in tumor cells, induces IL‐6 secretion, and drives M2b macrophage polarization and VEGF‐C–dependent lymphangiogenesis, revealing a microbiota‐driven mechanism linking tumor ...
Wentai Shangguan +17 more
wiley +1 more source
AAA ABSTRACT Protein glycosylation and phosphorylation are critical post‐translational modifications (PTMs) governing nearly all cellular functions, yet their analysis remains challenging due to reliance on costly and unsustainable enrichment materials.
Jiaying Li +9 more
wiley +1 more source
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang +4 more
doaj +1 more source
This study constructed the W1/O/W2 emulsion–based targeted therapy delivery system for ulcerative colitis (UC) utilizing LCC as surfactant for the first time. This multifunctional emulsion offered certain therapeutic advantages for UC, including targeted colonic delivery of active compounds, synergistic modulation of gut microbiota through combined ...
Qian Wu +9 more
wiley +1 more source
The critical pore spacing—approximately twenty times the pore radius—required to minimize electric field coupling is determined via finite element analysis. A multi‐layered Al2O3/Au/Si3N4 nanopore structure fabricated by helium ion beam lithography is proposed, enabling quantitative analysis of the target analyte while mitigating inter‐pore crosstalk ...
Silu Feng +5 more
wiley +1 more source
Improved integral attack——random linear distinguish and key recovery attack
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj +2 more sources

