Results 71 to 80 of about 264,704 (267)

Enzymatic degradation of biopolymers in amorphous and molten states: mechanisms and applications

open access: yesFEBS Open Bio, EarlyView.
This review explains how polymer morphology and thermal state shape enzymatic degradation pathways, comparing amorphous and molten biopolymer structures. By integrating structure–reactivity principles with insights from thermodynamics and enzyme engineering, it highlights mechanisms that enable efficient polymer breakdown.
Anđela Pustak, Aleksandra Maršavelski
wiley   +1 more source

Distinguishing Attacks on SOBER-t16 and t32 [PDF]

open access: yes, 2002
Two ways of mounting distinguishing attacks on two similar stream ciphers, SOBER-t16 and SOBER-t32, are proposed. It results in distinguishing attacks faster than exhaustive key search on full SOBER- t16 and on SOBER-t32 without stuttering.
Patrik Ekdahl, Thomas Johansson
openaire   +1 more source

Audio Features Affected by Music Expressiveness

open access: yes, 2016
Within a Music Information Retrieval perspective, the goal of the study presented here is to investigate the impact on sound features of the musician's affective intention, namely when trying to intentionally convey emotional contents via expressiveness.
Barthet M.   +8 more
core   +1 more source

Understanding bio‐based polymers: A study of origins, properties, biodegradation and their impact on health and the environment

open access: yesFEBS Open Bio, EarlyView.
This review provides an overview of bio‐based polymer sources, their unique functional properties and their environmental impact, and addresses their role as sustainable alternatives. It discusses end‐of‐life options, including composting and anaerobic digestion for renewable energy.
Sabina Kolbl Repinc   +8 more
wiley   +1 more source

Conscript Your Friends into Larger Anonymity Sets with JavaScript

open access: yes, 2013
We present the design and prototype implementation of ConScript, a framework for using JavaScript to allow casual Web users to participate in an anonymous communication system.
Corrigan-Gibbs, Henry, Ford, Bryan
core   +1 more source

Dihydroorotate dehydrogenase (DHODH) regulates trophoblast syncytialization through organelle stress–induced cellular senescence

open access: yesFEBS Open Bio, EarlyView.
The inhibition of mitochondrial dihydroorotate dehydrogenase (DHODH) impairs syncytialization and induces cellular senescence via mitochondrial and endoplasmic reticulum stress in human trophoblast stem cells, elevating sFlt1/PlGF levels, a hallmark of placental dysfunction in hypertensive disorders of pregnancy.
Kanoko Yoshida   +6 more
wiley   +1 more source

RSA modulus length regression prediction based on the Run Test and machine learning in the ciphertext-only scenarios

open access: yesComplex & Intelligent Systems
RSA is a classical public key cryptographic algorithm, over 40 years of widespread use has proven that its security is reliable when the key parameters are properly configured. Attacks against RSA mainly rely on its internal mathematical constructs, such
Ke Yuan   +5 more
doaj   +1 more source

Distinguishing stroke from transient ischemic attack using plaque characteristics and arterial transit artifacts

open access: yesFrontiers in Neurology
PurposeWe aimed to investigate the differences in plaque characteristics and hemodynamics in patients with ischemic stroke and transient ischemic attack (TIA), comparing the diagnostic abilities of high-resolution magnetic resonance imaging (HRMRI) and ...
Ling Li   +8 more
doaj   +1 more source

Best Information is Most Successful

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Using information-theoretic tools, this paper establishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach a given success rate, valid for any possible distinguishing rule and with
Eloi de Chérisey   +3 more
doaj   +1 more source

A novel distinguishing attack on Rocca

open access: yesIET Communications
Abstract The security of an encryption algorithm often hinges on the indistinguishability between ciphertext and random numbers. In block ciphers, pseudorandomness and super‐pseudorandomness are commonly used to depict the indistinguishability between ciphertext and random numbers.
Nan Liu   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy