Results 31 to 40 of about 2,921 (221)
Eutectozymes as Soft Hybrid Materials for Advanced Biocatalysis
Eutectozymes are sustainable hybrid materials that embed a GOx–HRP cascade within hydrophobic eutectogels featuring a dual supramolecular–covalent network. This architecture preserves native enzyme structure and stability, enables efficient heterogeneous biocatalysis in aqueous media, and positions eutectogels as robust platforms for next‐generation ...
Manuel Eduardo Martinez Cartagena +10 more
wiley +1 more source
Halorotetin B, a novel small‐molecule terpenoid identified from an edible marine ascidian, exhibits strong anti‐tumor activity both in vitro and in vivo through direct targeting UBE2C to induce tumor cell cycle arrest and then lead tumor cell senescence. As a newly discovered UBE2C inhibitor, Halorotetin B can serve as a novel potential cell senescence
Shanhao Han +6 more
wiley +1 more source
Two-permutation-based hashing with binary mixing
We consider the generic design of compression functions based on two n-bit permutations and XOR-based mixing functions. It is known that any such function mapping n+α${n+\alpha }$ to α bits, with 1≤α≤n${1\le \alpha \le n}$, can achieve at most min{2α/2 ...
Luykx Atul +3 more
doaj +1 more source
Classification of Balanced Quadratic Functions
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptographic primitives. They significantly impact the cryptographic strength and the implementation characteristics of an algorithm.
Lauren De Meyer, Begül Bilgin
doaj +1 more source
A synergistic antibiofilm hydrogel platform (ZBAg@FNP) is developed by encapsulating an organic small‐molecule photothermal agent (FNP) within a silver ion‐mediated supramolecular hydrogel (ZBAg), enabling photothermal disruption of biofilm integrity and controlled Ag⁺ ion release upon irradiation.
Yinghui Wen +8 more
wiley +1 more source
Time Sharing - A Novel Approach to Low-Latency Masking
We present a novel approach to small area and low-latency first-order masking in hardware. The core idea is to separate the processing of shares in time in order to achieve non-completeness.
Dilip Kumar S. V. +4 more
doaj +1 more source
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’s post-quantum cryptography standardization process.
Angshuman Karmakar +3 more
doaj +1 more source
ABSTRACT Australia's Robodebt scheme, an automated debt recovery program introduced in 2016, was exposed by the Robodebt Royal Commission (RC) as a serious failure of public administration and source of significant harm for thousands of Australians. Through a critical discourse analysis (CDA) of Australian news media, this study explores whether the RC'
Rebecca Coleman‐Hicks +1 more
wiley +1 more source
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck +2 more
doaj +1 more source
Abstract This scoping review has explored the interventions and approaches used by teachers in mainstream (general education) primary schools (students aged 4–11) to support self‐regulation skill development in the classroom. The review followed the PRISMA Extension for Scoping Reviews (PRISMA‐ScR) guidelines for reporting and was guided by the Joanna ...
Kim Griffin +3 more
wiley +1 more source

