Results 61 to 70 of about 215,935 (334)

Calcium modulating ligand confers risk for Parkinson's disease and impacts lysosomes

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
Abstract Objective Several genetic loci known to confer risk for Parkinson's disease (PD) function in lysosomal pathways. We systematically screened common variants linked to PD risk by genome‐wide association studies (GWAS) for impact on cerebrospinal fluid (CSF) proteins reflecting lysosomal function.
Hanwen Zhang   +16 more
wiley   +1 more source

Research and design of authenticated encryption algorithm based on AES round function

open access: yes网络与信息安全学报, 2020
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security. With the mixed integer linear programming
GAO Guoqiang, LI Zichen
doaj   +3 more sources

Incidence of and Risk of Mortality After Hip Fractures in Rheumatoid Arthritis Relative to the General Population

open access: yesArthritis Care &Research, Volume 77, Issue 5, Page 604-613, May 2025.
Objective Osteoporosis, a known complication of rheumatoid arthritis (RA), increases the risk of hip fracture, which is associated with high morbidity and mortality. Fracture risk estimates in patients with RA treated with contemporary treatment strategies are lacking.
C. Allyson Jones   +5 more
wiley   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Current Trends and Future Perspective for Cold Spray Metal‐Ceramic Composites

open access: yesAdvanced Engineering Materials, EarlyView.
The use of cold spray (CS) technology for creating cermet deposits, combining ceramic and metallic components, is advancing rapidly. Cermets offer excellent temperature handling and erosion resistance for diverse applications. This review outlines the current state of the art, focusing on the deposition dynamics and strategies to optimize the ...
Romario A. Wicaksono   +2 more
wiley   +1 more source

Low‐Activation Compositionally Complex Alloys for Advanced Nuclear Applications—A Review

open access: yesAdvanced Engineering Materials, EarlyView.
Low‐activation compositionally complex alloys (LACCAs) are advanced metallic materials primarily composed of low‐activation elements, offering advantages such as rapid compliance with operational standards and safe recyclability. This review highlights their potential for extreme high‐temperature irradiation environments as structural materials for ...
Yangfan Wang   +8 more
wiley   +1 more source

Chosen-Prefix Collisions on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen   +3 more
doaj   +1 more source

Hybrid Framework Materials: Next‐Generation Engineering Materials

open access: yesAdvanced Engineering Materials, Volume 27, Issue 9, May 2025.
Hybrid organic–inorganic materials merge the unique properties of organic and inorganic compounds, enabling applications in optoelectronics, gas storage, and catalysis. This review explores metal‐organic frameworks, hybrid organic–inorganic perovskites, and the emerging field of hybrid glasses, emphasizing their structures, functionalities, and ...
Jay McCarron   +2 more
wiley   +1 more source

Collusion Detection using Predictive Functions based on Android Applications

open access: yesSukkur IBA Journal of Computing and Mathematical Sciences, 2023
Android is used by most of the population of the users. It is an attractive target for malicious application developers due to its open source nature. These malicious writers are developing new trends to steal sensitive information from the devices.
Aurangzeb Magsi, Asad Hameed Soomro
doaj   +1 more source

Denying Collision In The Second Round Of Keccak Hash Function By Camouflaging Free Bits [PDF]

open access: yes, 2016
Keccak Hash Function is the winner of SHA3 competition. Hash function collision has become one of the fundamental problem in Keccak Hash Function. One of the attack which is based on collision has been proposed by Plasencia, et.al.
RATNA PUSPITA DEWI
core  

Home - About - Disclaimer - Privacy