Results 21 to 30 of about 174 (95)
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function [PDF]
Many modes of operations for block ciphers or tweakable block ciphers do not require invertibility from their underlying primitive. In this work, we study fixed-length Tweakable Pseudorandom Function (TPRF) with large domain extension, a novel primitive ...
Antoon Purnal +5 more
core
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery [PDF]
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible.
Danping Shi +6 more
core
Automatic Generation of Declarative Models For Differential Cryptanalysis [PDF]
When designing a new symmetric block cipher, it is necessary to evaluate its robustness against differential attacks. This is done by computing Truncated Differential Characteristics (TDCs) that provide bounds on the complexity of these attacks. TDCs are
+3 more
core +3 more sources
New Properties of Double Boomerang Connectivity Table [PDF]
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Danping Shi +4 more
core
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners [PDF]
In this paper, we study DFA attacks on some of the CAESAR competition winners. We study the challenges imposed by the design of these modes, such as masking of the ciphertext.
Anupam Chattopadhyay +2 more
core +1 more source
Targeting hexokinase 2 to induce breast cancer cell senescence
Background and Purpose Hexokinase 2 (HK2) is a key enzyme linked to high tumour cell proliferation. Its inhibitors such as 3‐bromopyruvic acid (3‐BP) induce cancer cell death, highlighting HK2 modulation as potential anti‐cancer treatment. However, standard chemotherapies often cause the emergence of senescent cancer cells, which goes along with cell ...
Helmut Bischof +8 more
wiley +1 more source
ZMAC+ – An Efficient Variable-output-length Variant of ZMAC [PDF]
There is an ongoing trend in the symmetric-key cryptographic community to construct highly secure modes and message authentication codes based on tweakable block ciphers (TBCs).
Eik List, Mridul Nandi
core +2 more sources
Role of the UHRF1–KLHL6–CORO2B axis in obesity‐related insulin resistance
In high‐fat diet (HFD)‐induced obese mice with insulin resistance, overexpression of UHRF1 may recruit DNMT1 to promote DNA methylation of KLHL6, leading to its downregulation. Subsequently, suppression of KLHL6 may decrease the ubiquitination of CORO2B, resulting in elevated CORO2B protein levels.
Xu Deng +5 more
wiley +1 more source
A total of 16 chemically synthesized capsular polysaccharide (CPS) fragments related to Pseudomonas aeruginosa, Staphylococcus aureus, and Acinetobacter baumannii were analyzed by glycan microarray. Comparative screening revealed three conserved epitopes that act as cross‐protective vaccine lead candidates against multidrug‐resistant (MDR) bacterial ...
Amar Kumar Mishra +9 more
wiley +2 more sources
Criptografia Autenticada -Uma breve análise dos concorrentes do CAESAR [PDF]
This survey seeks to briefly introduce the branch of authenticated cryptography as well as the concepts of "lightweight cryptography"; Or lightweight cryptography, presenting a brief description of the CAESAR participating algorithms, as well as ...
dos Santos, Luan Cardoso
core +2 more sources

