Results 51 to 60 of about 174 (95)

Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis [PDF]

open access: yes, 2023
In ASIACRYPT 2017, Rønjom et al. analyzed AES with yoyo attack. Inspired by their 4-round AES distinguisher, Grassi proposed the mixture differential cryptanalysis as well as a key recovery attack on 5-round AES, which was shown to be better than the ...
Tian Tian, Xiaofeng Xie
core  

Metformin‐Mediated Glycaemic Regulation as a Potential Strategy for Breast Cancer Prevention

open access: yesCancer Medicine, Volume 15, Issue 2, February 2026.
Metformin (MET), a common antihyperglycemic drug, shows promising anti‐cancer effects in breast cancer (BC). It activates adenosine monophosphate‐activated protein kinase (AMPK), regulating cellular energy and inducing cell cycle arrest, anti‐proliferation, and microenvironment alterations.
Ambulugala Gamage Rajika Greshamali Jinadasa   +4 more
wiley   +1 more source

18‐FDG PET in the Evaluation of Therapeutic Response of Necrotizing Otitis Externa

open access: yesThe Laryngoscope, Volume 136, Issue 2, Page 961-971, February 2026.
PET performed well in assessing the therapeutic response of NEO, with excellent sensitivity but low specificity of visual analysis. A complementary quantitative analysis was useful to distinguish between satisfactory and insufficient partial responses. ABSTRACT Objective The duration of antibiotic treatment for necrotizing otitis externa (NEO) and the ...
Lucie Lécolier   +5 more
wiley   +1 more source

Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function [PDF]

open access: yes, 2020
With the dawn of quantum computers, higher security than $128$ bits has become desirable for primitives and modes. During the past decade, highly secure hash functions, MACs, and encryption schemes have been built primarily on top of keyless permutations,
Eik List   +3 more
core  

Comparative multi‐omics in female mice reveals tissue‐specific vulnerabilities to chronic alcohol intake

open access: yesAlcohol, Clinical and Experimental Research, Volume 50, Issue 2, February 2026.
Using mice, we applied multi‐omics to compare liver and skeletal muscle after chronic alcohol consumption. The liver responded more strongly across genes, proteins, and metabolites, with a lowered PC:PE ratio. Muscle showed inflammation, extracellular matrix activation, impaired mitochondrial energetics, and an elevated PC:PE ratio. Lipidomics affected
Craig R. G. Willis   +6 more
wiley   +1 more source

Metabolism‐Regulating Nanomedicines for Cancer Therapy

open access: yesAdvanced NanoBiomed Research, Volume 6, Issue 1, January 2026.
This review highlights metabolism‐regulating nanomedicines designed to target glycolytic, lipid, amino acid, and nucleotide pathways in tumors. By incorporating metabolism‐regulating agents into versatile nanocarriers such as liposomes, micelles, dendrimers, and engineered bacteria, these platforms achieve targeted delivery, controlled release ...
Xiao Wu, Shiyi Geng, Jian Yang
wiley   +1 more source

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: yes
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao   +5 more
core  

Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]

open access: yes
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core  

Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs [PDF]

open access: yes, 2022
The desirable encryption scheme possesses high PRF security, high efficiency, and the ability to produce variable-length outputs. Since designing dedicated secure PRFs is difficult, a series of works was devoted to building optimally secure PRFs from the
Avijit Dutta, Eik List, Jian Guo
core  

Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials [PDF]

open access: yes, 2021
Collision attacks on AES-like hashing (hash functions constructed by plugging AES-like ciphers or permutations into the famous PGV modes or their variants) can be reduced to the problem of finding a pair of inputs respecting a differential of the ...
Congming Wei   +5 more
core  

Home - About - Disclaimer - Privacy