Results 61 to 70 of about 124,824 (277)

Generic Construction of Dual-Server Public Key Authenticated Encryption With Keyword Search

open access: yesIET Information Security
In this paper, we propose a generic construction of dual-server public key authenticated encryption with keyword search (DS-PAEKS) from PAEKS, public key encryption, and signatures.
Keita Emura
doaj   +1 more source

On a new fast public key cryptosystem [PDF]

open access: yes, 2015
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core  

Adaptor protein CIN85 potentiates the motility of osteosarcoma cells via the Akt/mTOR and MMP2‐COL3A1 axis

open access: yesMolecular Oncology, EarlyView.
CIN85 is highly expressed in osteosarcoma, particularly in metastatic lesions. Its overexpression increases cell migration and Matrigel invasion, while silencing CIN85 suppresses these behaviors. Transcriptome analysis shows that CIN85 regulates MMP2, COL3A1, and Akt/mTOR signaling. Targeting these pathways reverses CIN85‐induced motility, highlighting
Iryna Horak   +10 more
wiley   +1 more source

DNA methylation and expression of MAPRE3 affect overall survival of early‐stage non‐small cell lung cancer patients

open access: yesMolecular Oncology, EarlyView.
Both cg12821679MAPRE3 methylation and MAPRE3 expression are significantly associated with overall survival (OS) of non‐small cell lung cancer. Meanwhile, MAPRE3 expression significantly modified the effect of smoking cessation on OS. Smoking cessation benefits OS merely for patients with high MAPRE3 expression.
Chao Chen   +14 more
wiley   +1 more source

A Multivariate Public Key Encryption Scheme With Equality Test

open access: yesIEEE Access, 2020
The public key encryption with equality test (PKEET) allows the cloud server to judge whether two different ciphertexts are generated by the same message without decryption. Through this technique, PKEET provides an effective solution for building secure
Xiaoying Shen   +3 more
doaj   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Quantum Random Oracle Model for Quantum Public-Key Encryption

open access: yesIEEE Access, 2019
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj   +1 more source

Public key encryption using block ciphers [PDF]

open access: yes, 2003
A method for deriving a public key encryption system from any `conventional' (secret key) block cipher is described. The method is related to, but improves upon, Merkle's 'puzzle system'
Mitchell, Chris J.
core  

Tumor‐stromal crosstalk and macrophage enrichment are associated with chemotherapy response in bladder cancer

open access: yesFEBS Open Bio, EarlyView.
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold   +11 more
wiley   +1 more source

Poly-Dragon: an efficient multivariate public key cryptosystem

open access: yesJournal of Mathematical Cryptology, 2011
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our cryptosystem contains polynomials of total degree three in plaintext and ciphertext variables, two in plaintext variables and one in ciphertext variables ...
Singh Rajesh P., Saikia A., Sarma B. K.
doaj   +1 more source

Home - About - Disclaimer - Privacy