Efficient Identity-Based Encryption Without Random Oracles
Brent Waters
semanticscholar +1 more source
IqgC is a RasGAP from Dictyostelium discoideum. IqgC binds RasG via its RasGAP domain and deactivates it on macroendocytic cups, thereby suppressing the uptake of fluid and particles. IqgC has a positive effect on cell‐substratum adhesion, and its RGCt domain is required for recruitment to ventral foci.
Vedrana Filić +3 more
wiley +1 more source
Enhancing virtual physically unclonable function security through neuron-criticality analysis and lightweight encryption. [PDF]
Khan R +4 more
europepmc +1 more source
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security [PDF]
David McGrew, Scott Fluhrer
openalex +1 more source
Two‐way inhibition of PAX5 transcriptional activity by PAX5::CBFA2T3
PAX5::CBFA2T3 (PAX5‐C) is a fusion protein of the B‐cell transcription factor, PAX5, and is found in B‐cell ALL. We propose a putative model of two‐way inhibition of PAX5 transcriptional activity by PAX5‐C. There are two ways of repression by PAX5‐C: DNA‐binding‐dependent way and HDAC‐dependent way, with either being sufficient for the repression. HDAC
Reina Ueno +12 more
wiley +1 more source
A robust color image encryption algorithm based on 2D-SQSM hyperchaotic map and cyclic shift scrambling. [PDF]
Liu F, Wu S.
europepmc +1 more source
Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes
Ivan Damgård, Mads J. Jurik
openalex +2 more sources
Patch‐clamp recordings revealed that tamoxifen inhibits voltage‐gated sodium channels, especially under acidic conditions, both common in metastatic cancer cells. These effects may explain certain antitumor properties of tamoxifen, highlighting a novel mechanism of action beyond its known endocrine effects.
Karl Josef Föhr +5 more
wiley +1 more source
A new algorithm for multiple medical image encryption based on stacked representation and block division. [PDF]
Alsahafi YS +3 more
europepmc +1 more source
Low‐power Implementation of an Encryption/Decryption System with Asynchronous Techniques [PDF]
Nicolas Sklavos +3 more
openalex +1 more source

