Results 161 to 170 of about 327,487 (331)
Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application [PDF]
Syed Jahanzeb Hussain Pirzada +3 more
openalex +1 more source
Promiscuous stimulation of HSP70 ATPase activity by parasite‐derived J‐domains
The malaria parasite Plasmodium falciparum exports three highly homologous yet functionally divergent J‐domain proteins into human erythrocytes. Here, we show that J‐domains isolated from all three proteins effectively stimulate the ATPase activity of both endogenous host and exported parasite HSP70 chaperones.
Julian Barth +6 more
wiley +1 more source
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes [PDF]
Hassan Qahur Al Mahri +4 more
openalex +1 more source
Erythropoietin administration suppresses hepatic soluble epoxide hydrolase (sEH) expression, leading to increased CYP‐derived epoxides. This is associated with a shift in hepatic macrophage polarization characterized by reduced M1 markers and increased M2 markers, along with reduced hepatic inflammation, suppressed hepatic lipogenesis, and attenuated ...
Takeshi Goda +12 more
wiley +1 more source
Enhancement of cryptography algorithms for security of cloud-based IoT with machine learning models. [PDF]
Qasem MA +5 more
europepmc +1 more source
A Machine Learning Influenced Cryptographic Framework for Fast and Efficient Encryption
Sandeep das Yadav P +4 more
openalex +1 more source
We first identified functional murine mitochondrial N‐formyl peptides (MT‐FPs) and investigated their effects on the in vitro myeloid‐derived suppressor cell (MDSC) generation from bone marrow cells. We demonstrated that MT‐FPs acted directly on bone marrow cells to promote MDSC generation and modulated the polymorphonuclear (PMN)‐MDSC/monocyte (M ...
Miyako Ozawa +2 more
wiley +1 more source
Text encryption through bio-inspired DNA and RNA sequencing. [PDF]
Rashid OF, Abdulsahib SA, Al-Shahwani H.
europepmc +1 more source
Adiantum: length-preserving encryption for entry-level processors
Paul Crowley, Eric Biggers
openalex +2 more sources
On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle
Nadeem Iqbal +6 more
openalex +1 more source

