Results 61 to 70 of about 441,462 (365)
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits
Position scrambling (permutation) is widely used in multimedia encryption schemes and some international encryption standards, such as the Data Encryption Standard and the Advanced Encryption Standard.
Li, Chengqing, Lin, Dongdong, Lü, Jinhu
core +1 more source
Optimal Encryption of Quantum Bits [PDF]
We characterize the complete set of protocols that may be used to securely encrypt n quantum bits using secret and random classical bits. In addition to the application of such quantum encryption protocols to quantum data security, our framework allows ...
Boykin, P. Oscar, Roychowdhury, Vwani
core +4 more sources
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
Processing queries on encrypted data protects sensitive data stored in cloud databases. CryptDB has introduced the approach of adjustable encryption for such processing. A database column is adjusted to the necessary level of encryption, e.g. order-preserving, for the set of executed queries, but never reversed.
Florian Kerschbaum, Martin Härterich
openaire +3 more sources
Toll‐like receptors (TLRs) are important in the innate immune system. This study explores the zinc‐binding ability of the TLR2 TIR domain (TLR2TIR). We found that TLR2TIR binds zinc with nanomolar affinity through its cysteine residues. Two of them, C673 and C713, are vital for receptor activation, indicating that zinc may play a role in initiating ...
Vladislav A. Lushpa+8 more
wiley +1 more source
Autophagy in cancer and protein conformational disorders
Autophagy plays a crucial role in numerous biological processes, including protein and organelle quality control, development, immunity, and metabolism. Hence, dysregulation or mutations in autophagy‐related genes have been implicated in a wide range of human diseases.
Sergio Attanasio
wiley +1 more source
Strong Cryptography: The Global Tide of Change [PDF]
Encryption technology allows people using electronic networks to ensure that the messages they send remain private--secure from hackers, industrial espionage, government wiretap abuses, and spies.
Arnold G. Reinhold
core
A stepwise emergence of evolution in the RNA world
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley +1 more source
Stream Deniable-Encryption Algorithms [PDF]
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher.
N.A. Moldovyan +3 more
doaj
Reprogrammable meta-hologram for optical encryption
Meta-holographic encryption is a potentially important technique for information security. Despite rapid progresses in multi-tasked meta-holograms, the number of information channels available in metasurfaces is limited, making meta-holographic ...
Geyang Qu+7 more
semanticscholar +1 more source
The enzyme 5‐lipoxygenase (5‐LOX) catalyzes the first step in the biosynthesis of leukotrienes (LTs) involved in inflammatory pathophysiology. After cellular stimulation, 5‐LOX translocates to the nucleus, interacting with the 5‐LOX‐activating protein (FLAP) to form LTA4 from arachidonic acid (AA).
Erik Romp+5 more
wiley +1 more source