Results 71 to 80 of about 131,074 (313)

Enzymatic degradation of biopolymers in amorphous and molten states: mechanisms and applications

open access: yesFEBS Open Bio, EarlyView.
This review explains how polymer morphology and thermal state shape enzymatic degradation pathways, comparing amorphous and molten biopolymer structures. By integrating structure–reactivity principles with insights from thermodynamics and enzyme engineering, it highlights mechanisms that enable efficient polymer breakdown.
Anđela Pustak, Aleksandra Maršavelski
wiley   +1 more source

Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output

open access: yesIEEE Access, 2019
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing, it
Momeng Liu   +3 more
doaj   +1 more source

Bit Flipping Key Encapsulation for the Post-Quantum Era

open access: yesIEEE Access, 2023
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi   +3 more
doaj   +1 more source

Multi‐omics and low‐input proteomics profiling reveals dynamic regulation driving pluripotency initiation in early mouse embryos

open access: yesFEBS Open Bio, EarlyView.
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li   +8 more
wiley   +1 more source

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno   +5 more
doaj   +1 more source

Lossy Key Encapsulation Mechanism and Its Applications

open access: yes, 2017
We introduce a new notion, lossy key encapsulation mechanism lossy KEM, which enhances the notion of key encapsulation mechanism with lossiness, and can be more efficient than lossy trapdoor functions. We show that lossy KEM can be constructed from lossy trapdoor functions, lossy trapdoor relations, and entropic projective hashing. Using lossy KEM as a
LIU, Yamin   +3 more
openaire   +2 more sources

Predicting and Comparing the Subjective Health Experience of Older Cancer Survivors and Non‐Cancer Survivors: A Modeling Approach

open access: yesAging and Cancer, EarlyView.
This study underscores the significant influence of frailty and vitality on the subjective health experience of older cancer survivors with acceptance and control emerging as salient mediators. These findings affirm the conceptual and empirical robustness of the model highlighting its potential utility in shaping future interventions for older cancer ...
Damien S. E. Broekharst   +4 more
wiley   +1 more source

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka   +5 more
doaj   +1 more source

Life‐Threatening Bradycardia in Anti‐NMDA‐Receptor Encephalitis and a Novel Use for Permanent Pacing

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Pediatric anti‐NMDA receptor encephalitis (pNMDARE) is an autoantibody‐mediated disorder that can cause severe autonomic dysfunction, including symptomatic bradycardia and asystole. Dysautonomia can last for years, making it very challenging to manage.
Sarah Tucker   +9 more
wiley   +1 more source

Public Key Protocols from Twisted-Skew Group Rings

open access: yesCryptography
This article studies some algebraic structures known as twisted-skew group rings in the context of public key cryptography. We first present some background related to these structures to then specifically introduce particular twisted-skew group rings ...
Javier de la Cruz   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy