Results 61 to 70 of about 493,090 (289)
Terrorist threats and attacks provide major risks and sources of public crises in the 21st century. New probabilistic computing technologies possess the capability of increasing the success of identifying terrorist threats and solving cybersecurity and ...
Torsten Reimer, Nathanael Johnson
doaj +1 more source
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform
In this work, we present the first fault injection analysis of the Number Theoretic Transform (NTT). The NTT is an integral computation unit, widely used for polynomial multiplication in several structured lattice-based key encapsulation mechanisms ...
Prasanna Ravi +4 more
doaj +1 more source
Probabilistic Public Key Encryption with Equality Test
We present a (probabilistic) public key encryption (PKE) scheme such that when being implemented in a bilinear group, anyone is able to check whether two ciphertexts are encryptions of the same message. Interestingly, bilinear map operations are not required in key generation, encryption or decryption procedures of the PKE scheme, but is only required ...
YANG, Guomin +3 more
openaire +2 more sources
Decrypting cancer's spatial code: from single cells to tissue niches
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik +4 more
wiley +1 more source
Public Key Protocols from Twisted-Skew Group Rings
This article studies some algebraic structures known as twisted-skew group rings in the context of public key cryptography. We first present some background related to these structures to then specifically introduce particular twisted-skew group rings ...
Javier de la Cruz +3 more
doaj +1 more source
An efficient and secure protocol for checking remote data integrity in multi-cloud environment
In cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement.
H. Anwarbasha +2 more
doaj +1 more source
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam +5 more
doaj +1 more source
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad +17 more
wiley +1 more source
The IFNγ‐CIITA‐MHC II axis modulates melanoma cell susceptibility to NK‐cell‐mediated cytotoxicity
Natural killer (NK) cells play a central role in anti‐melanoma immunity. However, melanoma cells adapt during co‐culture by upregulating CIITA and MHC II in response to interferon gamma (IFNγ), thereby evading NK‐cell lysis. Blocking IFNγ signaling or treatment with dimethyl fumarate/simvastatin counteracts this immune escape and maintains NK‐cell ...
Lena C. M. Krause +6 more
wiley +1 more source

