Results 121 to 130 of about 230,478 (367)
A simple encryption algorithm [PDF]
In this paper I present a Simple Encryption Algorithm (SEAL), by which 128-bit long blocks can be quickly encrypted/decrypted. The algorithm is designed to run efficiently in software without any specialized hardware while still guaranteeing a strong degree of confidentiality.
openaire +1 more source
Clinical significance of stratifying prostate cancer patients through specific circulating genes
We tested a specific panel of genes representative of luminal, neuroendocrine and stem‐like cells in the blood of prostate cancer patients, showing predictive value from diagnosis to late stages of disease. This approach allows monitoring of treatment responses and outcomes at specific time points in trajectories.
Seta Derderian+12 more
wiley +1 more source
An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine
Cryptography is the science of writing messages in unknown form using mathematical models. In Cryptography, several ciphers were introduced for the encryption schemes.
B. Ravi Kumar+2 more
doaj
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok+3 more
doaj +1 more source
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin+14 more
wiley +1 more source
Deniable Functional Encryption [PDF]
Deniable encryption, first introduced by Canetti et al. [14], allows a sender and/or receiver of encrypted communication to produce fake but authentic-looking coins and/or secret keys that "open" the communication to a different message. Here we initiate its study for the more general case of functional encryption FE, as introduced by Boneh et al. [12],
De Caro A., Iovino V., O'Neill A.
openaire +2 more sources
NAD+ regeneration by mitochondrial complex I NADH dehydrogenase is important for cancer cell proliferation. Specifically, NAD+ is necessary for the activities of NAD+‐dependent deacetylases SIRT3 and SIRT7, which suppress the expression of p21Cip1 cyclin‐dependent kinase inhibitor, an antiproliferative molecule, at the translational and transcriptional
Masato Higurashi+5 more
wiley +1 more source
Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly.
Alaa Kadhim Farhan+4 more
doaj +1 more source
CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph [PDF]
Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users' privacy. To solve this problem, we propose CryptGraph, which runs graph analytics on encrypted graph to preserve the privacy ...
arxiv
On the security of the CAST encryption algorithm [PDF]
Howard M. Heys, Tavares
openalex +1 more source