Results 41 to 50 of about 177,532 (270)
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware +13 more
wiley +1 more source
Design and implementation of an energy-efficient Keccak algorithm ASIC
The complete hardware circuit of Keccak algorithm which can support the four modes of SHA3 is designed and implemented. Based on the detailed analysis of the sponge functions and Keccak algorithm, the modular idea is used to divide the circuit structure ...
Tuo Zhao, Chen Tao, Li Wei, Nan Longmei
doaj +1 more source
Learning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B. +2 more
core +2 more sources
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro +10 more
wiley +1 more source
This short survey article reviews progress in asymmetric (or public-key) cryptography. Knapsack methods are described along with the successful attacks by Shamir and others. The RSA method and certain generalisations are also considered.
openaire +2 more sources
Clinical Course and Impact of Breaks in Therapy for Children With Relapsed/Refractory Solid Tumors
ABSTRACT Introduction Pediatric relapsed or refractory (R/R) solid tumors carry a dismal prognosis, and postrelapse patient experiences are not well described. We present postrelapse outcomes, including number of R/R events and subsequent therapy regimens.
Matthew T. McEvoy +5 more
wiley +1 more source
Tomographic Quantum Cryptography
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige +28 more
core +1 more source
ABSTRACT Background Patients with high‐risk neuroblastoma who either are refractory to induction chemotherapy or relapse following multi‐modal treatment have a dismal prognosis. Based on data from the BEACON trial, since 2021 the UK national guidelines recommend bevacizumab, irinotecan, and temozolomide (BIT) for patients with relapsed/refractory ...
Thomas J. Jackson +20 more
wiley +1 more source
Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously.
Jiaxing Guo +5 more
doaj +1 more source
Counterfactual Quantum Cryptography
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal ...
C. H. Bennett +5 more
core +1 more source

