Results 71 to 80 of about 6,099,057 (328)

C9orf72 ALS‐causing mutations lead to mislocalization and aggregation of nucleoporin Nup107 into stress granules

open access: yesFEBS Letters, EarlyView.
Mutations in the C9orf72 gene represent the most common genetic cause of amyotrophic lateral sclerosis (ALS), a fatal neurodegenerative disease. Using patient‐derived neurons and C. elegans models, we find that the nucleoporin Nup107 is dysregulated in C9orf72‐associated ALS. Conversely, reducing Nup107 levels mitigates disease‐related changes.
Saygın Bilican   +7 more
wiley   +1 more source

Biophysical analysis of angiotensin II and amyloid‐β cross‐interaction in aggregation and membrane disruption

open access: yesFEBS Letters, EarlyView.
Angiotensin II (AngII), a neuropeptide, interacts with amyloid‐β (Aβ), a key player in Alzheimer's disease. This study reveals that AngII reduces Aβ aggregation and membrane disruption in vitro. Biophysical assays and molecular modeling suggest AngII binds disordered Aβ forms, potentially modulating early amyloidogenic events and contributing to ...
Mohsen Habibnia   +5 more
wiley   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism

open access: yesApplied Sciences, 2020
This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National ...
Ricardo Villanueva-Polanco   +1 more
doaj   +1 more source

Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms

open access: yesIEEE Access, 2021
Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the computational work required to break the core mechanisms of these schemes on a conventional ...
Crystal Andrea Roma   +2 more
doaj   +1 more source

Biological Control of Alfalfa Blotch Leafminer (Diptera: Agromyzidae) in Ontario: Status and Ecology of Parasitoids (Hymenoptera: Braconidae, Eulophidae) 20 Years After Introduction [PDF]

open access: yes, 2018
Two European parasitoid species were released in Ontario during the late 1970\u27s to control the alfalfa blotch leafminer, Agromyza frontella (Rondani) (Diptera: Agromyzidae). One of these, Dacnusa dryas (Nixon) (Hymenoptera: Braconidae), rapidly became
Heimpel, George E, Meloche, Francois
core   +2 more sources

Polydatin ameliorates ovalbumin‐induced asthma in a rat model through NCOA4‐mediated ferroautophagy and ferroptosis pathway

open access: yesFEBS Open Bio, EarlyView.
In this research, a rat model of asthma was created using OVA, and polydatin served as an intervention. By inhibiting ferroautophagy mediated by NCOA4 and averting ferroptosis, polydatin has been demonstrated to reduce asthma. This work presents new ideas for investigating the mechanism of polydatin's ability to alleviate asthma, in addition to ...
Wei Li   +5 more
wiley   +1 more source

Report on the 2nd MObility for Vesicle research in Europe (MOVE) symposium—2024

open access: yesFEBS Open Bio, EarlyView.
The 2nd MObility for Vesicle research in Europe (MOVE) Symposium in Belgrade brought over 280 attendees from 28 countries to advance extracellular vesicle (EV) research. Featuring keynotes, presentations, and industry sessions, it covered EV biogenesis, biomarkers, therapies, and manufacturing.
Dorival Mendes Rodrigues‐Junior   +5 more
wiley   +1 more source

Highly Vectorized SIKE for AVX-512

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
It is generally accepted that a large-scale quantum computer would be capable to break any public-key cryptosystem used today, thereby posing a serious threat to the security of the Internet’s public-key infrastructure.
Hao Cheng   +3 more
doaj   +1 more source

Lossy Key Encapsulation Mechanism and Its Applications

open access: yes, 2017
We introduce a new notion, lossy key encapsulation mechanism lossy KEM, which enhances the notion of key encapsulation mechanism with lossiness, and can be more efficient than lossy trapdoor functions. We show that lossy KEM can be constructed from lossy trapdoor functions, lossy trapdoor relations, and entropic projective hashing. Using lossy KEM as a
LIU, Yamin   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy