Results 121 to 130 of about 1,691,785 (320)
A Formula That Generates Hash Collisions
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core
A substrate promiscuous and regioselective O‐methyltransferase, SmOMT, is functionally and structurally characterized. A double mutant, SmOMTE152A/I306A, exhibited enhanced catalytic activity. By coupling this mutant with a mutant halide methyltransferase, AtHMTV140T, for SAM regeneration, a superior artificial fusion enzyme, AtHMTV140T‐L95‐SmOMTE152A ...
Xiran Xiong +11 more
wiley +1 more source
Improved integral attack——random linear distinguish and key recovery attack
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj +2 more sources
Macrophage‐derived TRIM21 drives the progression of AP via ubiquitin‐proteasome‐mediated degradation of PHB2, leading to impaired PHB2‐mediated mitophagy. Therefore, accumulation of cytosolic mtDNA hyperactivates the cGAS‐STING signaling axis, thereby amplifying inflammatory cascades.
Yansong Xu +7 more
wiley +1 more source
Untargeted Near-collision Attacks on Biometrics: Real-world Bounds and Theoretical Limits [PDF]
Axel Durbet +2 more
openalex +1 more source
Tracing the evolution from structural regulation to multifunctional integration, this paper systematically analyzes modification strategies for carbon‐based electrodes. It evaluates how element doping, surface functionalization, and composite material design affect the electrode performance, and offers perspectives on future applications and challenges
Yunlei Wang +4 more
wiley +1 more source
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo +4 more
doaj +1 more source
Microglial GPR35 Ameliorates Epileptogenesis and Neuroinflammation via PDGFA Domain 2 Signaling
Activation of microglial G protein–coupled receptor 35 (GPR35) by L‐kynurenic acid (L‐Kyna) initiates a platelet‐derived growth factor A (PDGFA)–dependent phosphoinositide 3‐kinase–protein kinase B (PI3K–AKT) signaling cascade that dampens hippocampal neuroinflammation, thereby restraining epileptogenesis, lowering seizure susceptibility, and ...
Qi Wang +17 more
wiley +1 more source
L-collision Attacks against Randomized MACs [PDF]
In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added, however. This paper shows that prefixing randomness to a message before running the message through an iterated MAC leads to an attack that takes only O (2(l+r)/3 + max{2l ...
openaire +1 more source
By encapsulating industrially relevant fabrics with dynamic imine networks, we show that the resulting composites exhibit exceptional oil absorbtion capability and chemical recyclability. It is poised for sustainable oil spill cleanup. ABSTRACT The development of high‐performance sorbents for oil spill remediation is highly desirable, which now calls ...
Changyi You +9 more
wiley +1 more source

