Results 71 to 80 of about 573,752 (297)

Survey on SAP and its application in public-key cryptography

open access: yesJournal of Mathematical Cryptology, 2020
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj   +1 more source

Dynamics of neural cryptography

open access: yes, 2007
Synchronization of neural networks has been used for novel public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive ...
A. Engel   +9 more
core   +1 more source

CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3

open access: yesMolecular Oncology, EarlyView.
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh   +12 more
wiley   +1 more source

Transcriptional profiling of circulating extracellular vesicles from prebiopsy prostate cancer patients

open access: yesMolecular Oncology, EarlyView.
RNA profiling of circulating extracellular vesicles (EVs) from blood samples of men undergoing prostate biopsy identifies transcripts associated with clinically significant prostate cancer. Integrative analysis with public tumor datasets links EV‐derived gene signatures to tumor stage and progression‐free survival, highlighting CASP3, XRCC2, and RIT1 ...
Stefan Werner   +14 more
wiley   +1 more source

Public Key Cryptography

open access: yesJournal of Physics: Conference Series, 2020
Abstract Public Key Cryptography is a software model that presents the process of encoding information, in this case the documents contained in a file. The encoding process begins by determining the master file or document that is ready to be encoded, then by applying the combination method, shifting and implementing the pass phrase to ...
openaire   +2 more sources

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

Combinatorial group theory and public key cryptography

open access: yes, 2004
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a ...
Shpilrain, Vladimir, Zapata, Gabriel
core   +2 more sources

Some cryptographic algorithms [PDF]

open access: yes, 2014
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core  

Adaptor protein CIN85 potentiates the motility of osteosarcoma cells via the Akt/mTOR and MMP2‐COL3A1 axis

open access: yesMolecular Oncology, EarlyView.
CIN85 is highly expressed in osteosarcoma, particularly in metastatic lesions. Its overexpression increases cell migration and Matrigel invasion, while silencing CIN85 suppresses these behaviors. Transcriptome analysis shows that CIN85 regulates MMP2, COL3A1, and Akt/mTOR signaling. Targeting these pathways reverses CIN85‐induced motility, highlighting
Iryna Horak   +10 more
wiley   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy