Results 31 to 40 of about 124,824 (277)
Certificate-based hybrid encryption scheme in the standard model
For construction a public cryptosystem that requiring fewer infrastructures than public key infrastructure(PKI),a certificate-based public-key encryption(CBE) scheme was proposed by Gentry.In CBE scheme,a certification was signed by a third part on an ...
KANG Li, TANG Xiao-hu, FAN Jia
doaj +2 more sources
A CCA2 Secure Variant of the McEliece Cryptosystem [PDF]
The McEliece public-key encryption scheme has become an interesting alternative to cryptosystems based on number-theoretical problems. Differently from RSA and ElGa- mal, McEliece PKC is not known to be broken by a quantum computer.
Dowsley, Rafael +3 more
core +5 more sources
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source
The Myth of Superiority of American Encryption Products [PDF]
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core
Yao’s millionaires’ problem and public-key encryption without computational assumptions
We offer efficient and practical solutions of Yao’s millionaires’ problem without using any one-way functions. Some of the solutions involve physical principles, while others are purely mathematical.
Grigoriev, D., Kish, L., Shpilrain, V.
core +2 more sources
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai +9 more
wiley +1 more source
Public key searchable encryption scheme based on blockchain
Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.
Ruizhong DU, Ailun TAN, Junfeng TIAN
doaj +2 more sources
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation [PDF]
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems.
Aleksandra Horubała +3 more
doaj +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala +15 more
wiley +1 more source

