Results 61 to 70 of about 535,713 (347)
Public key cryptography and error correcting codes as Ising models
We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes. In this approach, the transmitted codeword comprises Boolean sums of the original message bits selected by two randomly-constructed sparse ...
Kabashima, Yoshiyuki +2 more
core +1 more source
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad +17 more
wiley +1 more source
The integration of lattice‐based cryptography principles with Quantum Key Distribution (QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) ecosystems.
Sujit Biswas +4 more
doaj +1 more source
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Inverse matrices with applications in public-key cryptography
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography.
Farshid Haidary Makoui +1 more
doaj +1 more source
Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography ...
Jui-Di Wu +3 more
doaj +1 more source
Identity based cryptography from bilinear pairings [PDF]
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core
Screening for lung cancer: A systematic review of overdiagnosis and its implications
Low‐dose computed tomography (CT) screening for lung cancer may increase overdiagnosis compared to no screening, though the risk is likely low versus chest X‐ray. Our review of 8 trials (84 660 participants) shows added costs. Further research with strict adherence to modern nodule management strategies may help determine the extent to which ...
Fiorella Karina Fernández‐Sáenz +12 more
wiley +1 more source
Multivariate Quadratic Equations in Public-key Cryptography
The work is dedicated to appliances of multivariate quadratic equations in modern public-key cryptography. The existing cryptosystems are reviewed, pointing out their pros and contras.
Andrey Valerievich Zhatkin
doaj
Clinical trials on PARP inhibitors in urothelial carcinoma (UC) showed limited efficacy and a lack of predictive biomarkers. We propose SLFN5, SLFN11, and OAS1 as UC‐specific response predictors. We suggest Talazoparib as the better PARP inhibitor for UC than Olaparib.
Jutta Schmitz +15 more
wiley +1 more source

