Results 51 to 60 of about 529,456 (364)

Quantum asymmetric cryptography with symmetric keys

open access: yes, 2008
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system.
A. Kawachi   +41 more
core   +1 more source

Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]

open access: yes, 1999
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core   +2 more sources

Unlocking the potential of tumor‐derived DNA in urine for cancer detection: methodological challenges and opportunities

open access: yesMolecular Oncology, EarlyView.
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever   +1 more
wiley   +1 more source

Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]

open access: yesarXiv, 2023
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key ...
arxiv  

Cell‐free and extracellular vesicle microRNAs with clinical utility for solid tumors

open access: yesMolecular Oncology, EarlyView.
Cell‐free microRNAs (cfmiRs) are small‐RNA circulating molecules detectable in almost all body biofluids. Innovative technologies have improved the application of cfmiRs to oncology, with a focus on clinical needs for different solid tumors, but with emphasis on diagnosis, prognosis, cancer recurrence, as well as treatment monitoring.
Yoshinori Hayashi   +6 more
wiley   +1 more source

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

open access: yesIEEE Access, 2019
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu   +3 more
doaj   +1 more source

Certificateless Public Key Cryptography: A Research Survey

open access: yes, 2016
Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography.
Jacob Sayid, Isaac Sayid, J. Kar
semanticscholar   +1 more source

A concrete certificateless signature scheme without pairings [PDF]

open access: yes, 2009
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core   +2 more sources

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

Home - About - Disclaimer - Privacy