Results 71 to 80 of about 133,492 (314)

Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output

open access: yesIEEE Access, 2019
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing, it
Momeng Liu   +3 more
doaj   +1 more source

Segment Routing: a Comprehensive Survey of Research Activities, Standardization Efforts and Implementation Results

open access: yes, 2020
Fixed and mobile telecom operators, enterprise network operators and cloud providers strive to face the challenging demands coming from the evolution of IP networks (e.g.
Abdelsalam, Ahmed   +7 more
core   +1 more source

Metformin promotes mitochondrial integrity through AMPK‐signaling in Leber's hereditary optic neuropathy

open access: yesFEBS Open Bio, EarlyView.
Metformin mediates mitochondrial quality control in Leber's hereditary optic neuropathy (LHON) fibroblasts carrying mtDNA mutations. At therapeutic levels, metformin activates AMPK signaling to restore mitochondrial dynamics by promoting fusion and restraining fission, while preserving mitochondrial mass, enhancing autophagy/mitophagy and biogenesis ...
Chatnapa Panusatid   +3 more
wiley   +1 more source

Bit Flipping Key Encapsulation for the Post-Quantum Era

open access: yesIEEE Access, 2023
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi   +3 more
doaj   +1 more source

Lossy Key Encapsulation Mechanism and Its Applications

open access: yes, 2017
We introduce a new notion, lossy key encapsulation mechanism lossy KEM, which enhances the notion of key encapsulation mechanism with lossiness, and can be more efficient than lossy trapdoor functions. We show that lossy KEM can be constructed from lossy trapdoor functions, lossy trapdoor relations, and entropic projective hashing. Using lossy KEM as a
LIU, Yamin   +3 more
openaire   +2 more sources

Multi‐omics and low‐input proteomics profiling reveals dynamic regulation driving pluripotency initiation in early mouse embryos

open access: yesFEBS Open Bio, EarlyView.
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li   +8 more
wiley   +1 more source

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno   +5 more
doaj   +1 more source

A Bayesian Approach to Optimizing Stem Cell Cryopreservation protocols

open access: yes, 2014
Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors) as ...
Sambu, S
core   +1 more source

The parallel lives of polysaccharides in food and pharmaceutical formulations [PDF]

open access: yes, 2015
The present opinion article discusses how polysaccharide structures can be used in both food and pharmaceutical formulations. We distinguish two regions depending on moisture content where polysaccharides form structures with distinct functional ...
Kontogiorgos, Vassilis   +2 more
core   +1 more source

Chameleon sequences reveal structural effects in proteins representing micelle‐like distribution of hydrophobicity

open access: yesFEBS Open Bio, EarlyView.
Amino acids sequence of two different proteins with the same sequence (chameleon sequence—black boxes) represent in 3D structure of the proteins different secondary structures: HHHH—helical and BBB—Beta‐structural. The chains folded in water environment adopt different III‐order structures in which the chameleon fragments appear to adopt similar status
Irena Roterman   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy