Results 41 to 50 of about 120,753 (284)
Homomorphic encryption (HE) is a cryptosystem that allows the secure processing of encrypted data. One of the most popular HE schemes is the Brakerski-Fan-Vercauteren (BFV), which supports somewhat (SWHE) and fully homomorphic encryption (FHE).
Ali Sah Ozcan +3 more
doaj +1 more source
Quantum Metrology calculates the ultimate precision of all estimation strategies, measuring what is their root mean-square error (RMSE) and their Fisher information. Here, instead, we ask how many bits of the parameter we can recover, namely we derive an
Hassani, Majid +2 more
core +1 more source
Methods to improve antibody–drug conjugate (ADC) treatment durability in cancer therapy are needed. We utilized ADCs and immune‐stimulating antibody conjugates (ISACs), which are made from two non‐competitive antibodies, to enhance the entry of toxic payloads into cancer cells and deliver immunostimulatory agents into immune cells.
Tiexin Wang +3 more
wiley +1 more source
High-Performance Number Theoretic Transform on GPU Through radix2-CT and 4-Step Algorithms
The number theoretic transform (NTT) provides a practical and efficient technique to perform multiplication of very large degree polynomials typically found in fully homomorphic encryption (FHE), lattice-based cryptography, and non-interactive succinct ...
Alisah Ozcan +2 more
doaj +1 more source
Optimal Discrete Uniform Generation from Coin Flips, and Applications [PDF]
This article introduces an algorithm to draw random discrete uniform variables within a given range of size n from a source of random bits. The algorithm aims to be simple to implement and optimal both with regards to the amount of random bits consumed ...
Lumbroso, Jérémie
core
Basroparib inhibits YAP‐driven cancers by stabilizing angiomotin
Basroparib, a selective tankyrase inhibitor, suppresses Wnt signaling and attenuates YAP‐driven oncogenic programs by stabilizing angiomotin. It promotes AMOT–YAP complex formation, enforces cytoplasmic YAP sequestration, inhibits YAP/TEAD transcription, and sensitizes YAP‐active cancers, including KRAS‐mutant colorectal cancer, to MEK inhibition.
Young‐Ju Kwon +4 more
wiley +1 more source
Homomorphic Encryption (HE) allows performing specific algebraic computations on encrypted data without the need for decryption. For this reason, HE is emerging as a strong privacy-preserving solution in cloud computing environments since it allows to ...
Stefano Di Matteo +2 more
doaj +1 more source
Implementation of number-theoretic transforms
We propose various methods for the implementation of number-theoretic transforms to a prime or prime-power modulus. Such transforms may be performed in a processor or by special hardware. We also give, without proof, the condition for the existence of transforms in an arbitrary ring.
openaire +1 more source
Homologous expression and purification of human HAX‐1 for structural studies
This research protocol provides detailed instructions for cloning, expressing, and purifying large quantities of the intrinsically disordered human HAX‐1 protein, N‐terminally fused to a cleavable superfolder GFP, from mammalian cells. HAX‐1 is predicted to undergo posttranslational modifications and to interact with membranes, various cellular ...
Mariana Grieben
wiley +1 more source
Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum cryptography (PQC) for key encapsulation mechanisms. The performance on the field-programmable gate array (FPGA) affects the applicability of NewHope-NIST.
Neng Zhang +5 more
doaj +1 more source

