Results 91 to 100 of about 441,462 (365)
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core +2 more sources
Purification tags markedly affect self‐aggregation of CPEB3
Although recombinant proteins are used to study protein aggregation in vitro, uncleaved tags can interfere with accurate interpretation. Our findings demonstrate that His₆‐GFP and His₁₂ tags significantly affect liquid droplet and amyloid fibril formation in the intrinsically disordered region (IDR) of mouse cytoplasmic polyadenylation element‐binding ...
Harunobu Saito+6 more
wiley +1 more source
This study reveals how prime editing guide RNA (pegRNA) secondary structure and reverse transcriptase template length affect prime editing efficiency in correcting the phospholamban R14del cardiomyopathy‐associated mutation. Insights support the design of structurally optimized enhanced pegRNAs for precise gene therapy.
Bing Yao+7 more
wiley +1 more source
Encrypted Arabic Documents Search Model using Fuzzy Keywords in Cloud Computing
Cloud computing is a burgeoning and revolutionary technology that has changed how data are stored and computed in the cloud. This technology incorporates many elements into an innovative architecture.
Nidal Hassan Hussein+2 more
doaj +1 more source
A Novel Chaotic Image Encryption using Generalized Threshold Function
In this paper, after reviewing the main points of image encryption and threshold function, we introduce the methods of chaotic image encryption based on pseudorandom bit padding that the bits be generated by the novel generalized threshold function ...
Ahadpour, Sodeif+2 more
core +1 more source
An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box
This paper presents an efficient and secure chaotic S-Box based image encryption algorithm. Firstly, by cryptanalyzing a multiple chaotic S-Boxes based image encryption algorithm, we successfully cracked the cryptosystem by using chosen-plaintext attack (
Qing Lu, Congxu Zhu, Xiaoheng Deng
semanticscholar +1 more source
Single‐cell insights into the role of T cells in B‐cell malignancies
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley +1 more source
Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography. The chaotic outputs of many space units are used for encryption simultaneously.
Hu, Gang+6 more
core +2 more sources
SDR Implementation of a D2D Security Cryptographic Mechanism
Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important
Titus Balan+2 more
doaj +1 more source
Personal Data Security: Divergent Standards in the European Union and the United States [PDF]
This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the ...
Fleischmann, Amy
core +1 more source