COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos +6 more
wiley +1 more source
fPADnet: Small and Efficient Convolutional Neural Network for Presentation Attack Detection
The rapid growth of fingerprint authentication-based applications makes presentation attack detection, which is the detection of fake fingerprints, become a crucial problem.
Thi Hai Binh Nguyen +4 more
doaj +1 more source
Cube attacks on round-reduced TinyJAMBU
Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such ...
Wil Liam Teng +4 more
doaj +1 more source
Attacking quantum key distribution with single-photon two-qubit quantum logic
The Fuchs-Peres-Brandt (FPB) probe realizes the most powerful individual attack on Bennett-Brassard 1984 quantum key distribution (BB84 QKD) by means of a single controlled-NOT (CNOT) gate.
Shapiro, Jeffrey H., Wong, Franco N. C.
core +1 more source
Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley +1 more source
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants
The nonlinear invariant attack was introduced at ASIACRYPT 2016 by Todo et al.. The attack has received extensive attention of cryptographic community due to its practical application on the full-round block ciphers SCREAM, iSCREAM, and Midori64. However,
Yongzhuang Wei +3 more
doaj +1 more source
Formal Computational Unlinkability Proofs of RFID Protocols
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core +1 more source
Pathogenic Neurofibromatosis type 1 gene variants in tumors of non‐NF1 patients and role of R1276
Somatic variants of the neurofibromatosis type 1 (NF1) gene occur across neoplasms without clinical manifestation of the disease NF1. We identified emerging somatic pathogenic NF1 variants and hotspots, for example, at the arginine finger 1276. Those missense variants provide fundamental information about neurofibromin's role in cancer.
Mareike Selig +7 more
wiley +1 more source
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional network and software exploitation attacks that are ...
Daniel Dinu, Ilya Kizhvatov
doaj +1 more source
Distinguishing Attacks on the Stream Cipher Py [PDF]
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other is 1040 bytes) and it is designed for high speed software applications (Py is more than 2.5 times faster than the RC4 on Pentium III).
Souradyuti Paul +2 more
openaire +1 more source

