Results 61 to 70 of about 12,967 (325)

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

An Enhancement of the Elliptic Curve Cryptography by Using the PairingFunction

open access: yesAcademic Science Journal
In this paper, we propose two new algorithms to increase the security of the Elliptic Curve Cryptography (ECC) by using a pairing function. The two algorithms are based on using two pairing functions, which are the Cantor pairing function and the Elegant
Sarah Hatem Namous   +2 more
doaj   +1 more source

Factor-4 and 6 compression of cyclotomic subgroups of and

open access: yesJournal of Mathematical Cryptology, 2010
Bilinear pairings derived from supersingular elliptic curves of embedding degrees 4 and 6 over finite fields 𝔽2m and 𝔽3m, respectively, have been used to implement pairing-based cryptographic protocols.
Karabina Koray
doaj   +1 more source

Secure and Efficient Authentication Scheme in IoT Environments

open access: yesApplied Sciences, 2021
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments.
Abhijeet Thakare, Young-Gab Kim
doaj   +1 more source

Constructing suitable parameters for pairing-based cryptography [PDF]

open access: yes, 2021
Οι ̔ ̔ζευγισμοί ̓ ̓ παρουσιάστηκαν για πρώτη φορά από τον André Weil το 1940 και αρχικά χρησιμοποιήθηκαν ως μηχανισμός επίθεσης στο πρόβλημα διακριτού λογάριθμου σε ελλειπτικές καμπύλες. Περίπου 60 χρόνια μετά την ανακάλυψή τους, οι ζευγισμοί έχουν γίνει ένα από τα σπουδαιότερα αντικείμενα μελέτης στην κρυπτογραφία. ́Ενα από σημαντικότερα προβλήματα σε
openaire   +1 more source

A Fault Attack on Pairing-Based Cryptography [PDF]

open access: yesIEEE Transactions on Computers, 2006
Current fault attacks against public key cryptography focus on traditional schemes, such as RSA and ECC, and, to a lesser extent, on primitives such as XTR. However, bilinear maps, or pairings, have presented theorists with a new and increasingly popular way of constructing cryptographic protocols.
Page, DS, Vercauteren, Frederik R G
openaire   +1 more source

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

An unconditional experimental test of Nonclassicality

open access: yes, 2020
We theoretically introduce and experimentally demonstrate the realization of a nonclassicality test that allows for arbitrarily low detection efficiency without invoking any extra assumptions as independence of the devices.
Bourennane, M.   +5 more
core   +1 more source

Integrated genomic and proteomic profiling reveals insights into chemoradiation resistance in cervical cancer

open access: yesMolecular Oncology, EarlyView.
A comprehensive genomic and proteomic analysis of cervical cancer revealed STK11 and STX3 as a potential biomarkers of chemoradiation resistance. Our study demonstrated EGFR as a therapeutic target, paving the way for precision strategies to overcome treatment failure and the DNA repair pathway as a critical mechanism of resistance.
Janani Sambath   +13 more
wiley   +1 more source

Efficient Pairing-Free Attribute-Based Blind Signature Scheme Based on Ordered Binary Decision Diagram

open access: yesIEEE Access, 2022
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj   +1 more source

Home - About - Disclaimer - Privacy