Results 51 to 60 of about 389,362 (239)

Enzymatic degradation of biopolymers in amorphous and molten states: mechanisms and applications

open access: yesFEBS Open Bio, EarlyView.
This review explains how polymer morphology and thermal state shape enzymatic degradation pathways, comparing amorphous and molten biopolymer structures. By integrating structure–reactivity principles with insights from thermodynamics and enzyme engineering, it highlights mechanisms that enable efficient polymer breakdown.
Anđela Pustak, Aleksandra Maršavelski
wiley   +1 more source

Improved integral cryptanalysis of block cipher Zodiac

open access: yesCybersecurity
Integral cryptanalysis is a pivotal technique in symmetric-key cryptography. This paper enhances the integral key-recovery analysis of the Feistel-based cipher Zodiac by introducing a systematic framework for identifying optimal key recovery attack paths.
Yi Guo   +4 more
doaj   +1 more source

Multidimensional linear cryptanalysis [PDF]

open access: yes, 2010
Linear cryptanalysis is an important tool for studying the security of symmetric ciphers. In 1993 Matsui proposed two algorithms, called Algorithm 1 and Algorithm 2, for recovering information about the secret key of a block cipher.
Hermelin, Miia
core  

Understanding bio‐based polymers: A study of origins, properties, biodegradation and their impact on health and the environment

open access: yesFEBS Open Bio, EarlyView.
This review provides an overview of bio‐based polymer sources, their unique functional properties and their environmental impact, and addresses their role as sustainable alternatives. It discusses end‐of‐life options, including composting and anaerobic digestion for renewable energy.
Sabina Kolbl Repinc   +8 more
wiley   +1 more source

Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha

open access: yesIEEE Access
The stream cipher ChaCha has been subjected to differential linear cryptanalysis since 2008. Aumasson et al. (2008) laid the groundwork for this attack, employing the concept of probabilistically neutral bits for key recovery.
Nitin Kumar Sharma, Sabyasachi Dey
doaj   +1 more source

Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?

open access: yesIACR Transactions on Symmetric Cryptology, 2016
AEZ is a parallelizable, AES-based authenticated encryption algorithm that is well suited for software implementations on processors equipped with the AES-NI instruction set.
Colin Chaigneau, Henri Gilbert
doaj   +1 more source

Improved Attacks on LowMC with Algebraic Techniques

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj   +1 more source

Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups [PDF]

open access: yes, 2014
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus on subclasses of alternant/Goppa codes with a non trivial automorphism group. Such codes display
de Portzamparc, Frédéric   +4 more
core   +2 more sources

Multi‐omics and low‐input proteomics profiling reveals dynamic regulation driving pluripotency initiation in early mouse embryos

open access: yesFEBS Open Bio, EarlyView.
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li   +8 more
wiley   +1 more source

THEORETICALLY UNBREAKABLE CIPHERS AS THEY SHOULD BE UNDERSTOOD

open access: yesСовременные информационные технологии и IT-образование, 2018
Perfectly-secret ciphers according to the Claude Shannon's theory, which are considered as unbreakable, and more specifically random keystream ciphers, are discussed. An analysis of the sources mentioned in the reference list showed that all of them come
Alexander V. Babash   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy