Results 61 to 70 of about 529,456 (364)
A Design of Secure Communication Architecture Applying Quantum Cryptography
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim+2 more
doaj +1 more source
Using decision problems in public key cryptography [PDF]
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now.
Shpilrain, Vladimir, Zapata, Gabriel
core +3 more sources
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane+16 more
wiley +1 more source
Cryptography Vulnerabilities on HackerOne [PDF]
Previous studies have shown that cryptography is hard for developers to use and misusing cryptography leads to severe security vulnerabilities. We studied relevant vulnerability reports on the HackerOne bug bounty platform to understand what types of cryptography vulnerabilities exist in the wild.
arxiv
Adverse prognosis gene expression patterns in metastatic castration‐resistant prostate cancer
We aggregated a cohort of 1012 mCRPC tissue samples from 769 patients and investigated the association of gene expression‐based pathways with clinical outcomes. Loss of AR signaling, high proliferation, and a glycolytic phenotype were independently prognostic for poor outcomes, and an adverse transcriptional feature score incorporating these pathways ...
Marina N. Sharifi+26 more
wiley +1 more source
A Pseudo DNA Cryptography Method [PDF]
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation. Although in its primitive stage, DNA cryptography is shown to be very effective.
arxiv +1 more source
New approach to practical leakage-resilient public-key cryptography
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols.
Chakraborty Suvradip+2 more
doaj +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
Low expression of five purine metabolism‐related genes (ADSL, APRT, ADCY3, NME3, NME6) was correlated with poor survival in colorectal cancer. Immunohistochemistry analysis showed that low NME3 (early stage) and low ADSL/NME6 (late stage) levels were associated with high risk.
Sungyeon Kim+8 more
wiley +1 more source
Thompson’s Group and Public Key Cryptography [PDF]
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established protocols based on numeric computation. Notably, the protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al.
Vladimir Shpilrain, Alexander Ushakov
openaire +3 more sources