Results 71 to 80 of about 2,989,875 (336)
Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing, it
Momeng Liu +3 more
doaj +1 more source
An Active Attack on a Multiparty Key Exchange Protocol [PDF]
The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks.
Lopez-Ramos, Juan Antonio +3 more
core +4 more sources
Phytohormone brassinosteroid‐induced gene regulation by the transcription factor BIL1/BZR1 involves redox‐dependent DNA‐binding alternation and interaction with the transcription factor PIF4. The reduced BIL1/BZR1 dimer binds preferred cis‐elements, while oxidation alters its oligomerization state and disrupts DNA‐binding ability.
Shohei Nosaki +4 more
wiley +1 more source
Credential Authenticated Identification and Key Exchange [PDF]
This paper initiates a study of two-party identification and key-exchange protocols in which users authenticate themselves by proving possession of credentials satisfying arbitrary policies, instead of using the more traditional mechanism of a public-key infrastructure.
Camenisch J. +3 more
openaire +2 more sources
Structural dynamics of the plant hormone receptor ETR1 in a native‐like membrane environment
The present study unveils the structural and signaling dynamics of ETR1, a key plant ethylene receptor. Using an optimized nanodisc system and solution NMR, we captured full‐length ETR1 in a native‐like membrane environment. Our findings reveal dynamic domain uncoupling and Cu(I)‐induced rigidification, providing the first evidence of metal‐triggered ...
Moritz Lemke +2 more
wiley +1 more source
Edge computing has played an important role in enabling 5G technology which supports a great number of connected narrow-band IoT devices. In an edge computing architecture enabled with global mobile network, edge or IoT devices are wirelessly connected ...
Chien-Lung Hsu +4 more
doaj +1 more source
Cancer cell death induced by the NAD antimetabolite Vacor discloses the antitumor potential of SARM1
Vacor, a compound converted into the toxic metabolite Vacor adenine dinucleotide (VAD) by the nicotinamide salvage pathway enzymes NAMPT and NMNAT2, exhibits antitumor activity by inducing rapid and complete NAD depletion. We report that Vacor toxicity is limited to cell lines expressing high levels of SARM1, a NAD glycohydrolase.
Giuseppe Ranieri +5 more
wiley +1 more source
Survey of braid-based cryptography
The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes.
ZHU Ping1, WEN Qiao-yan2
doaj
A new key exchange protocol based on the decomposition problem [PDF]
In this paper we present a new key establishment protocol based on the decomposition problem in non-commutative groups which is: given two elements $w, w_1$ of the platform group $G$ and two subgroups $A, B \subseteq G$ (not necessarily distinct), find ...
Shpilrain, Vladimir, Ushakov, Alexander
core +2 more sources
Physical Origin of the One-Quarter Exact Exchange in Density Functional Theory [PDF]
Exchange interactions are a manifestation of the quantum mechanical nature of the electrons and play a key role in predicting the properties of materials from first principles.
Bernardi, Marco
core +1 more source

