Results 41 to 50 of about 212,764 (321)

Incidence and Outcome of Infants With Cancer in Canada: A Report From Cancer in Young People in Canada Database

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Infants with cancer are rare and face unique challenges. Our study aims to describe the incidence of infantile cancers in Canada and to compare treatment‐related mortality (TRM) and their outcomes with those of older children. Methods We conducted a retrospective cohort study using the Cancer in Young People in Canada database ...
Samuel Sassine   +22 more
wiley   +1 more source

Evaluating the Genetic Overlap Between Congenital Heart Disease and Neuroblastoma Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with congenital heart disease (CHD) have elevated neuroblastoma (NB) risk, potentially due to shared neural crest origins. We analyzed rare exonic de novo single‐nucleotide variants in 702 CHD and 454 NB trios from the Neuroblastoma Epidemiology in North America Study, Gabriella Miller Kids First Program, and a published cohort. Seven
Ji Yun Tark   +7 more
wiley   +1 more source

Design and implementation of an energy-efficient Keccak algorithm ASIC

open access: yesDianzi Jishu Yingyong, 2019
The complete hardware circuit of Keccak algorithm which can support the four modes of SHA3 is designed and implemented. Based on the detailed analysis of the sponge functions and Keccak algorithm, the modular idea is used to divide the circuit structure ...
Tuo Zhao, Chen Tao, Li Wei, Nan Longmei
doaj   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Despite the growing demand for software implementations of ECDSA secure against attackers with full control of the execution environment, scientific literature on ECDSA white-box design is scarce. The CHES 2021 WhibOx contest was thus held to assess the
Guillaume Barbu   +8 more
doaj   +3 more sources

Asymmetric Cryptography

open access: yesIrish Mathematical Society Bulletin, 1988
This short survey article reviews progress in asymmetric (or public-key) cryptography. Knapsack methods are described along with the successful attacks by Shamir and others. The RSA method and certain generalisations are also considered.
openaire   +2 more sources

Patient‐Level Barriers and Facilitators to Inpatient Physical Therapy in Adolescents and Young Adults With a Hematological Malignancy: A Qualitative Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher   +8 more
wiley   +1 more source

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

A Comparison of Cryptography Courses

open access: yes, 2004
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors.
Holden, Joshua
core   +1 more source

Home - About - Disclaimer - Privacy