Results 21 to 30 of about 174 (95)

Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function [PDF]

open access: yes, 2022
Many modes of operations for block ciphers or tweakable block ciphers do not require invertibility from their underlying primitive. In this work, we study fixed-length Tweakable Pseudorandom Function (TPRF) with large domain extension, a novel primitive ...
Antoon Purnal   +5 more
core  

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery [PDF]

open access: yes, 2022
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible.
Danping Shi   +6 more
core  

Automatic Generation of Declarative Models For Differential Cryptanalysis [PDF]

open access: yes, 2021
When designing a new symmetric block cipher, it is necessary to evaluate its robustness against differential attacks. This is done by computing Truncated Differential Characteristics (TDCs) that provide bounds on the complexity of these attacks. TDCs are
  +3 more
core   +3 more sources

New Properties of Double Boomerang Connectivity Table [PDF]

open access: yes, 2022
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Danping Shi   +4 more
core  

On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners [PDF]

open access: yes, 2019
In this paper, we study DFA attacks on some of the CAESAR competition winners. We study the challenges imposed by the design of these modes, such as masking of the ciphertext.
Anupam Chattopadhyay   +2 more
core   +1 more source

Targeting hexokinase 2 to induce breast cancer cell senescence

open access: yesBritish Journal of Pharmacology, EarlyView.
Background and Purpose Hexokinase 2 (HK2) is a key enzyme linked to high tumour cell proliferation. Its inhibitors such as 3‐bromopyruvic acid (3‐BP) induce cancer cell death, highlighting HK2 modulation as potential anti‐cancer treatment. However, standard chemotherapies often cause the emergence of senescent cancer cells, which goes along with cell ...
Helmut Bischof   +8 more
wiley   +1 more source

ZMAC+ – An Efficient Variable-output-length Variant of ZMAC [PDF]

open access: yes, 2017
There is an ongoing trend in the symmetric-key cryptographic community to construct highly secure modes and message authentication codes based on tweakable block ciphers (TBCs).
Eik List, Mridul Nandi
core   +2 more sources

Role of the UHRF1–KLHL6–CORO2B axis in obesity‐related insulin resistance

open access: yesJournal of Diabetes Investigation, EarlyView.
In high‐fat diet (HFD)‐induced obese mice with insulin resistance, overexpression of UHRF1 may recruit DNMT1 to promote DNA methylation of KLHL6, leading to its downregulation. Subsequently, suppression of KLHL6 may decrease the ubiquitination of CORO2B, resulting in elevated CORO2B protein levels.
Xu Deng   +5 more
wiley   +1 more source

Chemical Synthesis of Pseudomonas aeruginosa, Staphylococcus aureus, and Acinetobacter baumannii Capsular Polysaccharide Fragments as Leads for Cross‐Protection

open access: yesAngewandte Chemie, Volume 138, Issue 6, 2 February 2026.
A total of 16 chemically synthesized capsular polysaccharide (CPS) fragments related to Pseudomonas aeruginosa, Staphylococcus aureus, and Acinetobacter baumannii were analyzed by glycan microarray. Comparative screening revealed three conserved epitopes that act as cross‐protective vaccine lead candidates against multidrug‐resistant (MDR) bacterial ...
Amar Kumar Mishra   +9 more
wiley   +2 more sources

Criptografia Autenticada -Uma breve análise dos concorrentes do CAESAR [PDF]

open access: yes, 2015
This survey seeks to briefly introduce the branch of authenticated cryptography as well as the concepts of "lightweight cryptography"; Or lightweight cryptography, presenting a brief description of the CAESAR participating algorithms, as well as ...
dos Santos, Luan Cardoso
core   +2 more sources

Home - About - Disclaimer - Privacy