Results 71 to 80 of about 535,713 (347)

Attacking Tropical Stickel Protocol by MILP and Heuristic Optimization Techniques

open access: yesJournal of Cybersecurity and Privacy
Known attacks on the tropical implementation of Stickel protocol involve finding minimal covers for a certain covering problem, and this leads to an exponential growth in the worst case time required to recover the secret key as the used polynomial ...
Sulaiman Alhussaini, Sergeĭ Sergeev
doaj   +1 more source

Applications of single-qubit rotations in quantum public-key cryptography

open access: yes, 2008
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
A. Kawachi   +3 more
core   +1 more source

Methylation biomarkers can distinguish pleural mesothelioma from healthy pleura and other pleural pathologies

open access: yesMolecular Oncology, EarlyView.
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck   +12 more
wiley   +1 more source

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Public Key Cryptography

open access: yesJournal of Physics: Conference Series, 2020
Abstract Public Key Cryptography is a software model that presents the process of encoding information, in this case the documents contained in a file. The encoding process begins by determining the master file or document that is ready to be encoded, then by applying the combination method, shifting and implementing the pass phrase to ...
openaire   +2 more sources

Public-key cryptography and invariant theory

open access: yes, 2002
Public-key cryptosystems are suggested based on invariants of groups.
Grigoriev, D.
core   +1 more source

Next‐generation proteomics improves lung cancer risk prediction

open access: yesMolecular Oncology, EarlyView.
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj   +4 more
wiley   +1 more source

LINC01116, a hypoxia‐lncRNA marker of pathological lymphangiogenesis and poor prognosis in lung adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola   +12 more
wiley   +1 more source

Some cryptographic algorithms [PDF]

open access: yes, 2014
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core  

Home - About - Disclaimer - Privacy