Results 51 to 60 of about 406,684 (268)
Key-controlled Rijndael algorithm with multiple S-boxes
According to the design criterion of S-box in Rijndael algorithm,a number of S-boxes with good crypto-graphic properties were constructed,and the avalanche probabilities of these S-boxes were analyzed from variance point of view.Based on these studies,a ...
YIN Xin-chun 1, YANG Jie 1, XIE Li 2
doaj
A Quantum Differential Attack on ChaCha and Related Resources Estimation
Existing classical cryptanalytic techniques against ChaCha primarily rely on differential cryptanalysis, leveraging probabilistic neutral bits (PNBs) introduced by Aumasson et al. Separately, Bathe et al.
Mintu Mandal +2 more
doaj +1 more source
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Meta-dynamical adaptive systems and their applications to a fractal algorithm and a biological model
In this article, one defines two models of adaptive systems: the meta-dynamical adaptive system using the notion of Kalman dynamical systems and the adaptive differential equations using the notion of variable dimension spaces.
Alexander +19 more
core +1 more source
Attacking convolutional neural network using differential evolution [PDF]
Abstract The output of convolutional neural networks (CNNs) has been shown to be discontinuous which can make the CNN image classifier vulnerable to small well-tuned artificial perturbation. That is, images modified by conducting such alteration (i.e., adversarial perturbation) that make little difference to the human eyes can completely
Su, Jiawei +2 more
openaire +2 more sources
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256
Recently, Hosoyamada and Sasaki (EUROCRYPT 2020), and Xiaoyang Dong et al. (ASIACRYPT 2020) proposed quantum collision attacks against AES-like hashing modes AES-MMO and AES-MP.
Amit Kumar Chauhan +2 more
doaj +1 more source
Improved Differential Attacks on RC5 [PDF]
In this paper we investigate the strength of the secret-key algorithm RC5 newly proposed by Ron Rivest. The target version of RC5 works on words of 32 bits, has 12 rounds and a user-selected key of 128 bits. At Crypto'95 Kaliski and Yin estimated the strength of RC5 by differential and linear cryptanalysis.
Lars R. Knudsen, Willi Meier
openaire +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
Conditional differential analysis on the KATAN ciphers based on deep learning
KATAN ciphers are block ciphers using non‐linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning.
Dongdong Lin +3 more
doaj +1 more source

