Results 41 to 50 of about 389,362 (239)

Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2014
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity ...
F. Baghernejad, N. Bagheri, M. Safkhani
doaj   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Enhancing the Key Recovery Attack on Round Reduced Salsa

open access: yesIEEE Access
Salsa is the most well-known stream cipher and a finalist of the eSTREAM project. The concept of probabilistic neutral bits (PNBs) first presented by Aumasson et al., is the most important step in the cryptanalysis of Salsa.
Chandan Dey   +3 more
doaj   +1 more source

A New Algorithm for Solving Ring-LPN with a Reducible Polynomial [PDF]

open access: yes, 2014
The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive.
Guo, Qian   +2 more
core   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Pre‐analytical optimization of cell‐free DNA and extracellular vesicle‐derived DNA for mutation detection in liquid biopsies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen   +11 more
wiley   +1 more source

WSN key recovery attack based on symmetric matrix decomposition

open access: yesTongxin xuebao, 2018
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key ...
Xiangmin JI   +5 more
doaj   +2 more sources

Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs

open access: yesIEEE Access, 2023
In order to solve security and privacy-preservation issues in VANETs, a number of conditional privacy-preservation schemes based on certificateless signature (CLS) schemes and certificateless aggregate signature (CLAS) schemes have been proposed. However,
Kyung-Ah Shim
doaj   +1 more source

Rethinking plastic waste: innovations in enzymatic breakdown of oil‐based polyesters and bioplastics

open access: yesFEBS Open Bio, EarlyView.
Plastic pollution remains a critical environmental challenge, and current mechanical and chemical recycling methods are insufficient to achieve a fully circular economy. This review highlights recent breakthroughs in the enzymatic depolymerization of both oil‐derived polyesters and bioplastics, including high‐throughput protein engineering, de novo ...
Elena Rosini   +2 more
wiley   +1 more source

Walsh Spectrum Puncturing Revisited: Toward Automated Linear Key Recovery Attacks

open access: yesIACR Transactions on Symmetric Cryptology
Linear cryptanalysis has long served as a cornerstone in the security analysis of symmetric-key cryptanalytic primitives. Through more than 30 years of community efforts, it has become routine to use automated tools to search for the optimal linear ...
Chengan Hou, Shuyi Wang, Meicheng Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy