Results 61 to 70 of about 441,462 (365)

Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits

open access: yes, 2017
Position scrambling (permutation) is widely used in multimedia encryption schemes and some international encryption standards, such as the Data Encryption Standard and the Advanced Encryption Standard.
Li, Chengqing, Lin, Dongdong, Lü, Jinhu
core   +1 more source

Optimal Encryption of Quantum Bits [PDF]

open access: yes, 2000
We characterize the complete set of protocols that may be used to securely encrypt n quantum bits using secret and random classical bits. In addition to the application of such quantum encryption protocols to quantum data security, our framework allows ...
Boykin, P. Oscar, Roychowdhury, Vwani
core   +4 more sources

Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases

open access: yes, 2017
Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed.
Florian Kerschbaum, Martin Härterich
openaire   +3 more sources

The intracellular domain of TLR2 is capable of high‐affinity Zn binding: possible outcomes for the receptor activation

open access: yesFEBS Letters, EarlyView.
Toll‐like receptors (TLRs) are important in the innate immune system. This study explores the zinc‐binding ability of the TLR2 TIR domain (TLR2TIR). We found that TLR2TIR binds zinc with nanomolar affinity through its cysteine residues. Two of them, C673 and C713, are vital for receptor activation, indicating that zinc may play a role in initiating ...
Vladislav A. Lushpa   +8 more
wiley   +1 more source

Autophagy in cancer and protein conformational disorders

open access: yesFEBS Letters, EarlyView.
Autophagy plays a crucial role in numerous biological processes, including protein and organelle quality control, development, immunity, and metabolism. Hence, dysregulation or mutations in autophagy‐related genes have been implicated in a wide range of human diseases.
Sergio Attanasio
wiley   +1 more source

Strong Cryptography: The Global Tide of Change [PDF]

open access: yes, 1999
Encryption technology allows people using electronic networks to ensure that the messages they send remain private--secure from hackers, industrial espionage, government wiretap abuses, and spies.
Arnold G. Reinhold
core  

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

Stream Deniable-Encryption Algorithms [PDF]

open access: yesComputer Science Journal of Moldova, 2016
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher.
N.A. Moldovyan   +3 more
doaj  

Reprogrammable meta-hologram for optical encryption

open access: yesNature Communications, 2020
Meta-holographic encryption is a potentially important technique for information security. Despite rapid progresses in multi-tasked meta-holograms, the number of information channels available in metasurfaces is limited, making meta-holographic ...
Geyang Qu   +7 more
semanticscholar   +1 more source

Modifications in FLAP's second cytosolic loop influence 5‐LOX interaction, inhibitor binding, and leukotriene formation

open access: yesFEBS Letters, EarlyView.
The enzyme 5‐lipoxygenase (5‐LOX) catalyzes the first step in the biosynthesis of leukotrienes (LTs) involved in inflammatory pathophysiology. After cellular stimulation, 5‐LOX translocates to the nucleus, interacting with the 5‐LOX‐activating protein (FLAP) to form LTA4 from arachidonic acid (AA).
Erik Romp   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy