Results 111 to 120 of about 21,896,620 (367)

A note on quantum related-key attacks [PDF]

open access: yesarXiv, 2013
In a basic related-key attack against a block cipher, the adversary has access to encryptions under keys that differ from the target key by bit-flips. In this short note we show that for a quantum adversary such attacks are quite powerful: if the secret key is (i) uniquely determined by a small number of plaintext-ciphertext pairs, (ii) the block ...
arxiv  

Adherence and related factors in pregnant women with gestational diabetes

open access: yesActa Medica Iranica, 2021
Background: Gestational diabetes is a metabolic disease that can have multiple maternal and fetal complications. Therapeutic adherence can help controlling blood sugar and reducing its complications. This study investigates the medication adherence among
shiva Borzouei   +3 more
doaj  

The Cheilanthes hirta complex and allied species (Adiantaceae/Pteri­daceae) in southern Africa

open access: yesBothalia: African Biodiversity & Conservation, 1988
The very variable complex of plants until now ascribed to Cheilanthes hirta Swartz, together with some derived or allied species, is investigated. The type of the species as established by N. C. Anthony (1984), is accepted.
W. B. G. Jacobsen, N. H. G Jacobson
doaj   +1 more source

NF-κB: a key role in inflammatory diseases

open access: yes, 2001
Activation of the NF-κB/Rel transcription family, by nuclear translocation of cytoplasmic complexes, plays a central role in inflammation through its ability to induce transcription of proinflammatory genes (1). This pathway is activated upon appropriate
P. Tak, G. Firestein
semanticscholar   +1 more source

Identification of novel small molecule inhibitors of ETS transcription factors

open access: yesFEBS Letters, EarlyView.
ETS transcription factors play an essential role in tumourigenesis and are indispensable for sprouting angiogenesis, a hallmark of cancer, which fuels tumour expansion and dissemination. Thus, targeting ETS transcription factor function could represent an effective, multifaceted strategy to block tumour growth. The evolutionarily conserved E‐Twenty‐Six
Shaima Abdalla   +9 more
wiley   +1 more source

Annotated checklist of the plant bug tribe Mirini (Heteroptera: Miridae: Mirinae) recorded on the Korean Peninsula, with descriptions of three new species

open access: yesEuropean Journal of Entomology, 2018
An annotated checklist of the tribe Mirini (Miridae: Mirinae) recorded on the Korean peninsula is presented. A total of 113 species, including newly described and newly recorded species are recognized. Three new species, Apolygus hwasoonanus Oh, Yasunaga
Minsuk OH   +3 more
doaj   +1 more source

Quantum cryptography: Public key distribution and coin tossing [PDF]

open access: yesTheoretical Computer Science, 2014
Charles H. Bennett, Gilles Brassard
semanticscholar   +1 more source

INEL Spray-forming Research [PDF]

open access: yes, 1992
Spray forming is a near-net-shape fabrication technology in which a spray of finely atomized liquid droplets is deposited onto a suitably shaped substrate or mold to produce a coherent solid.
Key, James F., Mchugh, Kevin M.
core   +1 more source

The Saccharomyces cerevisiae amino acid transporter Lyp1 has a broad substrate spectrum

open access: yesFEBS Letters, EarlyView.
In Saccharomyces cerevisiae, Yeast Amino acid Transporter family members mediate the import of amino acids, ranging from substrate specialists to generalists. Here, we show that the specialist transporter, Lyp1, has a broader substrate spectrum than previously described, with affinity constants spanning from micromolar to millimolar.
Foteini Karapanagioti   +3 more
wiley   +1 more source

Secret Key Generation from Correlated Sources and Secure Link [PDF]

open access: yesarXiv, 2017
In this paper, we study the problem of secret key generation from both correlated sources and a secure channel. We obtain the optimal secret key rate in this problem and show that the optimal scheme is to conduct secret key generation and key distribution jointly, where every bit in the secret channel will yield more than one bit of secret key rate ...
arxiv  

Home - About - Disclaimer - Privacy