Results 91 to 100 of about 406,684 (268)
Атака апаратних збоїв на проріджуючий генератор псевдовипадкових чисел [PDF]
Запропоновано алгоритм диференційноїкриптоатак збоїв на базовукомпоненту сучасних потокових шифрів – регістр зсуву з лінійними зворотними зв’язками.
Карпінський, Богдан
core
Pathogenic Neurofibromatosis type 1 gene variants in tumors of non‐NF1 patients and role of R1276
Somatic variants of the neurofibromatosis type 1 (NF1) gene occur across neoplasms without clinical manifestation of the disease NF1. We identified emerging somatic pathogenic NF1 variants and hotspots, for example, at the arginine finger 1276. Those missense variants provide fundamental information about neurofibromin's role in cancer.
Mareike Selig +7 more
wiley +1 more source
Differential Cryptanalysis Based on Transformer Model and Attention Mechanism [PDF]
In differential analysis-based cryptographic attacks, Bayesian optimization is typically used to verify whether the partially decrypted data exhibit differential characteristics.
XIAO Chaoen, LI Zifan, ZHANG Lei, WANG Jianxin, QIAN Siyuan
doaj +1 more source
Symmetry of stochastic equations
Symmetry methods are by now recognized as one of the main tools to attack deterministic differential equations (both ODEs and PDEs); the situation is quite different for what concerns stochastic differential equations: here, symmetry considerations are ...
Gaeta, Giuseppe
core
Stroke Mimic: A Case of Unilateral Thyrotoxic Hypokalemic Periodic Paralysis [PDF]
Thyrotoxic hypokalemic periodic paralysis (THPP) is a condition that results in transient skeletal muscle paralysis secondary to intracellular potassium sequestration.
Lajeunesse, Michael, Young, Scott
core
We investigated the toxicity of 12 active compounds commonly found in herbal weight loss supplements (WLS) using human liver and colon cell models. Epigallocatechin‐3‐gallate was the only compound showing significant toxicity. Metabolic profiling revealed protein degradation, disrupted energy and lipid metabolism suggesting that the inclusion of EGCG ...
Emily C. Davies +3 more
wiley +1 more source
Improved preimage and pseudo-collision attacks on SM3 hash function
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known ...
Jian ZOU, Le DONG
doaj +2 more sources
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon +6 more
wiley +1 more source
Enzymatic degradation of biopolymers in amorphous and molten states: mechanisms and applications
This review explains how polymer morphology and thermal state shape enzymatic degradation pathways, comparing amorphous and molten biopolymer structures. By integrating structure–reactivity principles with insights from thermodynamics and enzyme engineering, it highlights mechanisms that enable efficient polymer breakdown.
Anđela Pustak, Aleksandra Maršavelski
wiley +1 more source
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj +1 more source

