Results 51 to 60 of about 2,989,875 (336)

Speciation Through the Lens of Population Dynamics: A Theoretical Primer on How Small and Large Populations Diverge

open access: yesPopulation Ecology, EarlyView.
Population size and dynamics fundamentally shape speciation by influencing genetic drift, founder events, and adaptive potential. Small populations may speciate rapidly due to stronger drift, whereas large populations harbor more genetic diversity, which can alter divergence trajectories. We highlight theoretical models that incorporate population size
Ryo Yamaguchi   +3 more
wiley   +1 more source

Formation and Inhibition of Calcium Carbonate Crystals under Cathodic Polarization Conditions

open access: yesCrystals, 2020
The formation of CaCO3 crystals on the cathode surface and the scale-inhibition performance of scale inhibitor 2-phosphonobutane-1,2,4-tricarboxylic acid (PBTCA) on the cathode surface were studied by methods of solution analysis, gravimetric analysis ...
Kun Sheng   +7 more
doaj   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

EasyUC: using EasyCrypt to mechanize proofs of universally composable security [PDF]

open access: yes, 2019
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols ...
Canetti, Ran   +2 more
core   +2 more sources

Mechanisms and kinetic assays of aminoacyl‐tRNA synthetases

open access: yesFEBS Letters, EarlyView.
Accurate protein synthesis is crucial for life. The key players are aminoacyl‐tRNA synthetases (AARSs), which read the genetic code by pairing cognate amino acids and tRNAs. AARSs establish high amino acid selectivity by employing physicochemical limits in molecular recognition.
Igor Zivkovic   +2 more
wiley   +1 more source

Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE

open access: yesCryptography
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their
Maksymilian Gorski, Wojciech Wodo
doaj   +1 more source

Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems

open access: yesIEEE Access, 2019
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT enabled cyber-physical systems. Smart objects and smart devices over CPS are
K. M. Renuka   +3 more
doaj   +1 more source

Non-invertible key exchange protocol

open access: yesSN Applied Sciences, 2020
We investigate a cryptosystem through what we call non-invertible cryptography. As a result of a continuous refinement process, we present a new key exchange method to establish a secret key between two remote parties.
Luis Adrian Lizama-Perez
doaj   +1 more source

Home - About - Disclaimer - Privacy