Results 111 to 120 of about 529,456 (364)

Some cryptographic algorithms [PDF]

open access: yes, 2014
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core  

Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies

open access: yesFEBS Open Bio, EarlyView.
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa   +13 more
wiley   +1 more source

Genetic diversity and population structure of the Taigan dog breed

open access: yesFEBS Open Bio, EarlyView.
The Taigan is a rare sighthound from the mountains of Kyrgyzstan. We used DNA markers to study its genetic diversity and compare it with other sighthound breeds. Our findings show that the Taigan shares close genetic ties with the Kazakh Tazy, suggesting a common ancestry shaped by nomadic traditions and regional adaptation.
Kira Bespalova   +10 more
wiley   +1 more source

Myostatin Levels in SMA Following Disease‐Modifying Treatments: A Multi‐Center Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective This study investigated myostatin levels in SMA patients receiving disease‐modifying therapies (DMTs) to understand their relationship with treatment duration and functional status. Methods Our study includes both cross‐sectional and longitudinal analyses of myostatin levels in treated SMA patients.
Fiorella Piemonte   +23 more
wiley   +1 more source

Cryptography: Classical versus Post-Quantum [PDF]

open access: yesarXiv
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to ...
arxiv  

Trusted Certificates in Quantum Cryptography [PDF]

open access: yesarXiv, 2006
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv  

RSA: Dagli anni '70 al giorno d'oggi

open access: yesAtti della Accademia Peloritana dei Pericolanti : Classe di Scienze Fisiche, Matematiche e Naturali, 2006
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj   +1 more source

On the Cryptanalysis of Public-Key Cryptography [PDF]

open access: yes, 2012
Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice is studied and techniques are presented to speed-up the underlying arithmetic on parallel architectures.
openaire   +1 more source

Coffee Consumption Is Associated With Later Age‐at‐Onset of Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Observation studies suggest that coffee consumption may lower the risk and delay the age‐at‐onset (AAO) of Parkinson's disease (PD). The aim of this study was to explore the causal relationship and genetic association between coffee consumption and the AAO, risk, and progression of PD. Using Mendelian randomization, we identified a significant
Dariia Kuzovenkova   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy