Results 81 to 90 of about 133,492 (314)

Public Key Protocols from Twisted-Skew Group Rings

open access: yesCryptography
This article studies some algebraic structures known as twisted-skew group rings in the context of public key cryptography. We first present some background related to these structures to then specifically introduce particular twisted-skew group rings ...
Javier de la Cruz   +3 more
doaj   +1 more source

Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection

open access: yesIEEE Access, 2019
Deniable authenticated encryption (DAE) is a cryptographic primitive that supports data confidentiality with deniable authentication in an efficient manner. The DAE plays a significant role in location-based service systems for privacy protection.
Guanhua Chen   +6 more
doaj   +1 more source

Evolutionarily divergent DUF4465 domains have a common vitamin B12‐binding function

open access: yesFEBS Open Bio, EarlyView.
We show that DUF4465 family proteins, widespread across bacteria from gut microbiomes, hydrothermal vents, and soil, share a common vitamin B12‐binding function. These augmented β‐jellyroll proteins bind vitamin B12 via extended loops. Our findings establish sequence‐diverse DUF4465 proteins as a widespread class of B12‐binding proteins, highlighting ...
Charlea Clarke   +4 more
wiley   +1 more source

Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism

open access: yes, 2018
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property.
XUE, Haiyang   +4 more
openaire   +2 more sources

Intercompartmental communication in senescence

open access: yesFEBS Open Bio, EarlyView.
Senescent cells experience structural changes in the plasma membrane, endoplasmic reticulum, mitochondria, lysosomes, nucleus, and cytoskeleton. These alterations disrupt crosstalk among cellular compartments, impairing vesicular trafficking, contact sites, and molecular flow.
Krystyna Mazan‐Mamczarz   +3 more
wiley   +1 more source

Secure Cryptographic Key Encapsulation and Recovery Scheme in Noisy Network Conditions

open access: yesApplied Sciences
In this study, we present the Response-Based Key Encapsulation Mechanism (R-KEM), an ephemeral key encapsulation and recovery scheme tailored for cryptographic systems in high-noise, high-jamming network environments.
Dina Ghanai Miandoab   +5 more
doaj   +1 more source

A CRC usefulness assessment for adaptation layers in satellite systems [PDF]

open access: yes, 2006
This paper assesses the real usefulness of CRCs in today's satellite network-to-link adaptation layers under the lights of enhanced error control and framing techniques, focusing on the DVB-S and DVB-S2 standards.
Buret, Isabelle   +2 more
core   +1 more source

Life‐Threatening Bradycardia in Anti‐NMDA‐Receptor Encephalitis and a Novel Use for Permanent Pacing

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Pediatric anti‐NMDA receptor encephalitis (pNMDARE) is an autoantibody‐mediated disorder that can cause severe autonomic dysfunction, including symptomatic bradycardia and asystole. Dysautonomia can last for years, making it very challenging to manage.
Sarah Tucker   +9 more
wiley   +1 more source

A Concrete LIP-Based KEM With Simple Lattices

open access: yesIEEE Access
Recent developments have been made in the construction of cryptosystems with security based on the hardness of the lattice isomorphism problem (LIP). Due to lattice conjectures, one may expect in the future that breaking such schemes is computationally ...
Gustavo de Castro Biage   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy