Results 91 to 100 of about 406,684 (268)

Атака апаратних збоїв на проріджуючий генератор псевдовипадкових чисел [PDF]

open access: yes, 2005
Запропоновано алгоритм диференційноїкриптоатак збоїв на базовукомпоненту сучасних потокових шифрів – регістр зсуву з лінійними зворотними зв’язками.
Карпінський, Богдан
core  

Pathogenic Neurofibromatosis type 1 gene variants in tumors of non‐NF1 patients and role of R1276

open access: yesFEBS Open Bio, EarlyView.
Somatic variants of the neurofibromatosis type 1 (NF1) gene occur across neoplasms without clinical manifestation of the disease NF1. We identified emerging somatic pathogenic NF1 variants and hotspots, for example, at the arginine finger 1276. Those missense variants provide fundamental information about neurofibromin's role in cancer.
Mareike Selig   +7 more
wiley   +1 more source

Differential Cryptanalysis Based on Transformer Model and Attention Mechanism [PDF]

open access: yesJisuanji gongcheng
In differential analysis-based cryptographic attacks, Bayesian optimization is typically used to verify whether the partially decrypted data exhibit differential characteristics.
XIAO Chaoen, LI Zifan, ZHANG Lei, WANG Jianxin, QIAN Siyuan
doaj   +1 more source

Symmetry of stochastic equations

open access: yes, 2004
Symmetry methods are by now recognized as one of the main tools to attack deterministic differential equations (both ODEs and PDEs); the situation is quite different for what concerns stochastic differential equations: here, symmetry considerations are ...
Gaeta, Giuseppe
core  

Stroke Mimic: A Case of Unilateral Thyrotoxic Hypokalemic Periodic Paralysis [PDF]

open access: yes, 2020
Thyrotoxic hypokalemic periodic paralysis (THPP) is a condition that results in transient skeletal muscle paralysis secondary to intracellular potassium sequestration.
Lajeunesse, Michael, Young, Scott
core  

Evaluation of in vitro toxicity of common phytochemicals included in weight loss supplements using 1H NMR spectroscopy

open access: yesFEBS Open Bio, EarlyView.
We investigated the toxicity of 12 active compounds commonly found in herbal weight loss supplements (WLS) using human liver and colon cell models. Epigallocatechin‐3‐gallate was the only compound showing significant toxicity. Metabolic profiling revealed protein degradation, disrupted energy and lipid metabolism suggesting that the inclusion of EGCG ...
Emily C. Davies   +3 more
wiley   +1 more source

Improved preimage and pseudo-collision attacks on SM3 hash function

open access: yesTongxin xuebao, 2018
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known ...
Jian ZOU, Le DONG
doaj   +2 more sources

dUTPase is essential in zebrafish development and possesses several single‐nucleotide variants with pronounced structural and functional consequences

open access: yesFEBS Open Bio, EarlyView.
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon   +6 more
wiley   +1 more source

Enzymatic degradation of biopolymers in amorphous and molten states: mechanisms and applications

open access: yesFEBS Open Bio, EarlyView.
This review explains how polymer morphology and thermal state shape enzymatic degradation pathways, comparing amorphous and molten biopolymer structures. By integrating structure–reactivity principles with insights from thermodynamics and enzyme engineering, it highlights mechanisms that enable efficient polymer breakdown.
Anđela Pustak, Aleksandra Maršavelski
wiley   +1 more source

Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj   +1 more source

Home - About - Disclaimer - Privacy