Results 41 to 50 of about 62,040 (316)
Securing Color Information Based on CEDPM Keys
In this paper, a novel approach to generating keys for securing color information by combining discrete wavelet transform (DWT) in conjunction with chaotic functions is presented.
Gaurav Verma +3 more
doaj +1 more source
An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector [PDF]
Securing the information from the attackers is a crucial aspect of modern digital life. Numerous cryptographic algorithms are employed to provide security for data transmission.
Bilas Haldar +2 more
doaj +1 more source
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core +1 more source
Encryption of Covert Information into Multiple Statistical Distributions
A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented.
Bennett +15 more
core +1 more source
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source
In line with the growth of the e-governate, the Kurdistan Regional Government is actively adopting digital transformation, which underscores the urgent requirement for distinct encryption methods that are practical for the Kurdish alphabet in the fields ...
Newroz Nooralddin Abdulrazaq
doaj +1 more source
A Novel Data Encryption Algorithm To Ensure Database Security
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim +4 more
doaj +1 more source
Mechanisms of parasite‐mediated disruption of brain vessels
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira +3 more
wiley +1 more source
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker +16 more
wiley +1 more source

