Results 51 to 60 of about 235,449 (333)
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
Making tau amyloid models in vitro: a crucial and underestimated challenge
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley +1 more source
On Higher-Order Cryptography [PDF]
International ...
Barak B., Crubille R., Dal Lago U.
openaire +6 more sources
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan+3 more
doaj +1 more source
On Cheating Immune Secret Sharing [PDF]
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +1 more source
Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze+3 more
wiley +1 more source
Probability theory and public-key cryptography [PDF]
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
arxiv
Cryptography Vulnerabilities on HackerOne [PDF]
Previous studies have shown that cryptography is hard for developers to use and misusing cryptography leads to severe security vulnerabilities. We studied relevant vulnerability reports on the HackerOne bug bounty platform to understand what types of cryptography vulnerabilities exist in the wild.
arxiv
The power of microRNA regulation—insights into immunity and metabolism
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto+2 more
wiley +1 more source
A new quantum cryptanalysis method on block cipher Camellia
Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on Simon's algorithm.
Yanjun Li, Hao Lin, Meng Liang, Ying Sun
doaj +1 more source