Randomness testing of the advanced encryption standard finalist candidates
Juan Soto, Lawrence E. Bassham
openalex +1 more source
A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 [PDF]
James Manger
openalex +1 more source
Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication. [PDF]
Periasamy JK+3 more
europepmc +1 more source
The role of circular RNAs in regulating cytokine signaling in cancer
Cytokines present in the tumor microenvironment fuel cancer development. Aberrant expression of circRNAs contributes to cancer progression. Cytokines are involved in regulating circRNA biogenesis. Furthermore, aberrantly expressed circRNAs regulate the expression of ligands, receptors, and downstream effectors involved in cytokine signaling to promote ...
Vandana Joshi+4 more
wiley +1 more source
Triple-layered security system: reliable and secured image communications over 5G and beyond networks. [PDF]
Srour T+3 more
europepmc +1 more source
Identifying prognostic targets in metastatic prostate cancer beyond AR
Genome‐wide functional screens combined with a large gene expression database and clinical outcomes can identify new therapeutic vulnerabilities in prostate cancer. Eight potentially druggable targets demonstrated strong dependency in cell lines, were associated with worse prognosis clinically, and showed evidence of protein expression in prostate ...
Emily Feng+13 more
wiley +1 more source
Does Encryption with Redundancy Provide Authenticity? [PDF]
Jee Hea An, Mihir Bellare
openalex +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
A J B, P K, R K, R M.
europepmc +1 more source
d‐Allulose can be produced from d‐fructose by d‐allulose 3‐epimerase. Based on sequence homology information, we successfully engineered thermostable mutants with the protein engineering method. By integrating positive mutations, we constructed an enzyme that exhibits hyperthermostability without a loss in the activity.
Kensaku Shimada+3 more
wiley +1 more source
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
Anand Desai
openalex +1 more source