Results 21 to 30 of about 7,683 (138)

Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions

open access: yes, 2009
Algebraic and fast algebraic attacks are power tools to analyze stream ciphers. A class of symmetric Boolean functions with maximum algebraic immunity were found vulnerable to fast algebraic attacks at EUROCRYPT'06. Recently, the notion of AAR (algebraic
Lin Dongdai, Liu Meicheng, Pei Dingyi
core   +1 more source

MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]

open access: yes, 2006
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov   +14 more
core   +3 more sources

Fast Deterministic Selection [PDF]

open access: yes, 2016
The Median of Medians (also known as BFPRT) algorithm, although a landmark theoretical achievement, is seldom used in practice because it and its variants are slower than simple approaches based on sampling.
Alexandrescu, Andrei
core   +2 more sources

Large compact clusters and fast dynamics in coupled nonequilibrium systems

open access: yes, 2016
We demonstrate particle clustering on macroscopic scales in a coupled nonequilibrium system where two species of particles are advected by a fluctuating landscape and modify the landscape in the process.
Barma, Mustansir   +3 more
core   +1 more source

Time-delayed models of gene regulatory networks [PDF]

open access: yes, 2015
We discuss different mathematical models of gene regulatory networks as relevant to the onset and development of cancer. After discussion of alternativemodelling approaches, we use a paradigmatic two-gene network to focus on the role played by time ...
Blyuss, K B   +3 more
core   +4 more sources

07021 Abstracts Collection -- Symmetric Cryptography [PDF]

open access: yes, 2007
From .. to .., the Dagstuhl Seminar 07021 ``Symmetric Cryptography\u27\u27 automatically was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and
Biham, Eli   +3 more
core   +1 more source

The macroscopic effects of microscopic heterogeneity

open access: yes, 2012
Over the past decade, advances in super-resolution microscopy and particle-based modeling have driven an intense interest in investigating spatial heterogeneity at the level of single molecules in cells.
Aleksic   +83 more
core   +1 more source

CED: Color Event Camera Dataset [PDF]

open access: yes, 2019
Event cameras are novel, bio-inspired visual sensors, whose pixels output asynchronous and independent timestamped spikes at local intensity changes, called 'events'.
Barnes, Nick   +5 more
core   +2 more sources

Selective Targeting of Immune Checkpoints HLA‐G and CD47 Using Novel Dual Signaling Protein DSP216 Promotes Innate Anticancer Immunity

open access: yesAdvanced Science, EarlyView.
The inhibitory immune checkpoints HLA‐G and CD47 are expressed on certain tumor types and inhibit immune cells in the tumor microenvironment. DSP216 binds specifically to cancer cells expressing both HLA‐G and CD47, and blocks their inhibitory signaling.
Lisa J. Jacob   +12 more
wiley   +1 more source

Revealing Protein–Protein Interactions Using a Graph Theory‐Augmented Deep Learning Approach

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study presents a fast, cost‐efficient approach for classifying protein–protein interactions by integrating graph‐theory parametrization with deep learning (DL). Multiscale features extracted from graph‐encoded polarized‐light microscopy (PLM) images enable accurate prediction of binding strengths.
Bahar Dadfar   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy