Results 71 to 80 of about 406,684 (268)

Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256

open access: yesJournal of Mathematical Cryptology, 2017
CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a candidate for Advanced Encryption Standard (AES). In this paper, we will propose a new chosen text attack, the multiple differential-zero correlation linear
Hadian Dehkordi Massoud   +1 more
doaj   +1 more source

An investigation of a close-coupled canard as a direct side-force generator on a fighter model at Mach numbers from 0.40 to 0.90 [PDF]

open access: yes
The canard panels had 5 deg of dihedral and were deflected differentially or individually over an incidence range from 10 deg to -10 deg and a model angle-of-attack range from -4 deg to 15 deg. Significant side forces were generated in a transonic tunnel
Capone, F. J., Re, R. J.
core   +1 more source

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

Redox regulation meets metabolism: targeting PRDX2 to prevent hepatocellular carcinoma

open access: yesMolecular Oncology, EarlyView.
PRDX2 acts as a central redox hub linking metabolic dysfunction‐associated steatohepatitis (MASH) to hepatocellular carcinoma (HCC). In normal hepatocytes, PRDX2 maintains redox balance and metabolic homeostasis under oxidative stress. In contrast, during malignant transformation, PRDX2 promotes oncogenic signaling, stemness, and tumor initiation ...
Naroa Goikoetxea‐Usandizaga   +2 more
wiley   +1 more source

Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer

open access: yesMolecular Oncology, EarlyView.
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta   +10 more
wiley   +1 more source

Improvement Differential fault attack on TWINE

open access: yesTongxin xuebao, 2017
A new method of differential fault attack was proposed,which was based on the nibble-group differential diffusion property of the lightweight block cipher TWINE.On the basis of the statistical regularity of the S-box differential distribution,the lower ...
Yang GAO   +3 more
doaj   +2 more sources

Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on two AES-like permutations, P1024 and Q1024, with non-square input and output registers.
Victor Cauchois   +2 more
doaj   +1 more source

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition

open access: yesIEEE Access, 2020
Recently, as the number of IoT (Internet of Things) devices has increased, the use of lightweight cryptographic algorithms that are suitable for environments with scarce resources has also increased.
Seonghyuck Lim   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy