Results 181 to 190 of about 299,742 (318)
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security [PDF]
David McGrew, Scott Fluhrer
openalex +1 more source
All-Optical Encryption and Decryption at 120 Gb/s Using Carrier Reservoir Semiconductor Optical Amplifier-Based Mach-Zehnder Interferometers. [PDF]
Kotb A, Zoiros KE, Chen W.
europepmc +1 more source
The K+‐Cl− cotransporters (KCCs) facilitate the symport of ions across the plasma membrane. They participate in physiological processes including neuronal regulation. Here, we characterized KCCs from Drosophila and Hydra vulgaris. Comparative analyses of transporters provide insights into the mechanism of KCC ion transport, regulation, and evolution ...
Satoshi Fudo+4 more
wiley +1 more source
A cryptosystem for face recognition based on optical interference and phase truncation theory. [PDF]
Guo Y, Zhai P, Jia D, Li W.
europepmc +1 more source
Cleavable N‐terminal Thioredoxin fusion enabled soluble expression and purification of otherwise insoluble SARS‐CoV‐2 Nucleocapsid (N) protein. A four‐step purification strategy yielded highly homogeneous, RNA‐free N protein. Binding assays showed high RNA affinity (Kd ~ 28 nm). The study will facilitate high‐resolution structural studies of N protein,
Shweta Singh, Gagan D. Gupta
wiley +1 more source
Acceleration for Encryption processing Using Reconfigurable Computing
Teruyoshi Yamaguchi+2 more
openalex +2 more sources
Reuse of CMS Content Encryption Keys [PDF]
Stephen Farrell, Seán Turner
openalex +1 more source
Interaction of class III cellobiose dehydrogenase with lytic polysaccharide monooxygenase
The activity of lytic polysaccharide monooxygenase (LPMO) is supported by its auxiliary enzyme cellobiose dehydrogenase (CDH). The catalytic activity of both enzymes is coupled by electron transfer and a cyclic cascade generating substrates for both enzymes – hydrogen peroxide for LPMO and oxidized and non‐oxidized cellobiose and cello‐oligosaccharide ...
Angela Giorgianni+4 more
wiley +1 more source
Crumpled and Abraded Encryption: Implementation and Provably Secure Construction
Scott Griffy
openalex +2 more sources