Results 41 to 50 of about 6,099,057 (328)
Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications
Public key algorithms based on quasi-cyclic binary moderate-density parity-check codes (QC-MDPCs) and QC low-density parity-check codes (QC-LDPCs) codes for key encapsulation and encryption submitted to the NIST post-quantum competition (Bit Flipping Key
Pavol Zajac
doaj +1 more source
Erythrocytes as Carriers of Therapeutic Enzymes. [PDF]
Therapeutic enzymes are administered for the treatment of a wide variety of diseases. They exert their effects through binding with a high affinity and specificity to disease-causing substrates to catalyze their conversion to a non-noxious product, to ...
Bax, BE
core +1 more source
The parallel lives of polysaccharides in food and pharmaceutical formulations [PDF]
The present opinion article discusses how polysaccharide structures can be used in both food and pharmaceutical formulations. We distinguish two regions depending on moisture content where polysaccharides form structures with distinct functional ...
Kontogiorgos, Vassilis +2 more
core +1 more source
Background: Encapsulation is a valuable method used to protect active substances and enhance their physico-chemical properties. It can also be used as protection from unpleasant scents and flavors or adverse environmental conditions.
David Řepka +3 more
doaj +1 more source
Secured Electronic Voting System Using RSA Key Encapsulation Mechanism
A secured process whereas enumerating and casting of votes with the electronic aids with aim of improving the performance of electoral system is called E-voting (Electronic voting).
B. O. Ahubele, L. U. Oghenekaro
semanticscholar +1 more source
Lack of phenotypic and evolutionary cross-resistance against parasitoids and pathogens in Drosophila melanogaster [PDF]
BackgroundWhen organisms are attacked by multiple natural enemies, the evolution of a resistance mechanism to one natural enemy will be influenced by the degree of cross-resistance to another natural enemy.
A Fytrou +52 more
core +2 more sources
Droplet-based digital antibiotic susceptibility screen reveals single-cell clonal heteroresistance in an isogenic bacterial population [PDF]
Since antibiotic resistance is a major threat to global health, recent observations that the traditional test of minimum inhibitory concentration (MIC) is not informative enough to guide effective antibiotic treatment are alarming.
Debski, Pawel R. +9 more
core +1 more source
Attack on the Edon-kKey Encapsulation Mechanism [PDF]
The key encapsulation mechanism Edon-K was proposed in response to the call for post-quantum cryptography standardization issued by the National Institute of Standards and Technologies (NIST). This scheme is inspired by the McEliece scheme but uses another family of codes defined over $\mathbb{F}_{2^{128}}$ instead of $\mathbb{F}_2$ and is not based on
Lequesne, Matthieu, Tillich, Jean-Pierre
openaire +4 more sources
LSA project technology development update [PDF]
The state of low cost solar array technology is discussed.
Bickler, D. B., Goldsmith, J. V.
core +2 more sources
INAKA: Improved Authenticated Key Agreement Protocol Based on Newhope
The Newhope scheme is one of the milestones of the study in key agreement protocol but it lacks the anti-active-attack capability. In this article, we propose a mutual authenticated key agreement scheme named INAKA scheme based on the commitment value ...
Yatao Yang +5 more
doaj +1 more source

