Results 111 to 120 of about 529,456 (364)
Some cryptographic algorithms [PDF]
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core
Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa+13 more
wiley +1 more source
Genetic diversity and population structure of the Taigan dog breed
The Taigan is a rare sighthound from the mountains of Kyrgyzstan. We used DNA markers to study its genetic diversity and compare it with other sighthound breeds. Our findings show that the Taigan shares close genetic ties with the Kazakh Tazy, suggesting a common ancestry shaped by nomadic traditions and regional adaptation.
Kira Bespalova+10 more
wiley +1 more source
Public-key cryptography and password protocols [PDF]
Maurizio Kliban Boyarsky
openalex +1 more source
Myostatin Levels in SMA Following Disease‐Modifying Treatments: A Multi‐Center Study
ABSTRACT Objective This study investigated myostatin levels in SMA patients receiving disease‐modifying therapies (DMTs) to understand their relationship with treatment duration and functional status. Methods Our study includes both cross‐sectional and longitudinal analyses of myostatin levels in treated SMA patients.
Fiorella Piemonte+23 more
wiley +1 more source
Cryptography: Classical versus Post-Quantum [PDF]
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to ...
arxiv
Trusted Certificates in Quantum Cryptography [PDF]
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv
RSA: Dagli anni '70 al giorno d'oggi
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj +1 more source
On the Cryptanalysis of Public-Key Cryptography [PDF]
Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice is studied and techniques are presented to speed-up the underlying arithmetic on parallel architectures.
openaire +1 more source
Coffee Consumption Is Associated With Later Age‐at‐Onset of Parkinson's Disease
ABSTRACT Observation studies suggest that coffee consumption may lower the risk and delay the age‐at‐onset (AAO) of Parkinson's disease (PD). The aim of this study was to explore the causal relationship and genetic association between coffee consumption and the AAO, risk, and progression of PD. Using Mendelian randomization, we identified a significant
Dariia Kuzovenkova+3 more
wiley +1 more source