Results 21 to 30 of about 7,692 (124)

Wave-Shaped Round Functions and Primitive Groups [PDF]

open access: yes, 2018
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo   +4 more
core   +2 more sources

07021 Abstracts Collection -- Symmetric Cryptography [PDF]

open access: yes, 2007
From .. to .., the Dagstuhl Seminar 07021 ``Symmetric Cryptography\u27\u27 automatically was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and
Biham, Eli   +3 more
core   +1 more source

The use of a formal sensitivity analysis on epidemic models with immune protection from maternally acquired antibodies [PDF]

open access: yes, 2011
This paper considers the outcome of a formal sensitivity analysis on a series of epidemic model structures developed to study the population level effects of maternal antibodies.
Chapman, James D.   +2 more
core   +1 more source

Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions

open access: yes, 2009
Algebraic and fast algebraic attacks are power tools to analyze stream ciphers. A class of symmetric Boolean functions with maximum algebraic immunity were found vulnerable to fast algebraic attacks at EUROCRYPT'06. Recently, the notion of AAR (algebraic
Lin Dongdai, Liu Meicheng, Pei Dingyi
core   +1 more source

Algorithm 959: VBF: A Library of C plus plus Classes for Vector Boolean Functions in Cryptography [PDF]

open access: yes, 2016
VBF is a collection of C++ classes designed for analyzing vector Boolean functions (functions that map a Boolean vector to another Boolean vector) from a cryptographic perspective.
Zufiria Zatarain, Pedro Jose   +1 more
core   +2 more sources

Optimal Control of Tuberculosis: A Review

open access: yes, 2014
We review the optimal control of systems modeling the dynamics of tuberculosis. Time dependent control functions are introduced in the mathematical models, representing strategies for the improvement of the treatment and cure of active infectious and/or ...
Silva, Cristiana J.   +1 more
core   +1 more source

Epidemic Threshold in Continuous-Time Evolving Networks [PDF]

open access: yes, 2018
Current understanding of the critical outbreak condition on temporal networks relies on approximations (time scale separation, discretization) that may bias the results.
Colizza, Vittoria   +3 more
core   +3 more sources

Large compact clusters and fast dynamics in coupled nonequilibrium systems

open access: yes, 2016
We demonstrate particle clustering on macroscopic scales in a coupled nonequilibrium system where two species of particles are advected by a fluctuating landscape and modify the landscape in the process.
Barma, Mustansir   +3 more
core   +1 more source

Enhancement of vaccinia virus based oncolysis with histone deacetylase inhibitors [PDF]

open access: yes, 2010
Histone deacetylase inhibitors (HDI) dampen cellular innate immune response by decreasing interferon production and have been shown to increase the growth of vesicular stomatitis virus and HSV.
Atkins, H   +15 more
core   +1 more source

Selective Targeting of Immune Checkpoints HLA‐G and CD47 Using Novel Dual Signaling Protein DSP216 Promotes Innate Anticancer Immunity

open access: yesAdvanced Science, EarlyView.
The inhibitory immune checkpoints HLA‐G and CD47 are expressed on certain tumor types and inhibit immune cells in the tumor microenvironment. DSP216 binds specifically to cancer cells expressing both HLA‐G and CD47, and blocks their inhibitory signaling.
Lisa J. Jacob   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy