Results 41 to 50 of about 6,586,318 (243)
Symbolic Plithogenic Numbers in RSA Cryptography: A Path to Post-Quantum Security
The RSA algorithm, with its strong mathematical foundation rooted in number theory and its wide range of applications in secure communication, is one of the most widely used public-key encryption methods.
Mehmet Merkepci +2 more
doaj +1 more source
Revocable identity‐based matchmaking encryption in the standard model
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang +5 more
doaj +1 more source
ABSTRACT Purpose Malignant rhabdoid tumor of the kidney (MRTK) is a rare, aggressive tumor seen in young children. The optimal timing of resection for locally advanced tumors is not well‐defined. The purpose of this study is to evaluate modern oncologic outcomes and the impact of surgical timing. Methods A multicenter retrospective review was performed
Hannah N. Rinehardt +76 more
wiley +1 more source
A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking Services
Nowadays there are many social networking services supporting three-party communication such as Skype, Line, and Facebook Messenger. To ensure the message security, a cryptographic encryption scheme is a commonly adopted measure. However, the traditional
Han-Yu Lin
doaj +1 more source
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir +9 more
core +1 more source
MYCN Amplification in RB1‐Inactivated Retinoblastoma: Association With High‐Risk Features
ABSTRACT Background MYCN amplification occurs in a subset of retinoblastoma cases, both with and without RB1 inactivation. It has been suggested that retinoblastomas with MYCN amplification represent a distinct entity with more aggressive clinical behavior.
Kyriaki Papaioannou +9 more
wiley +1 more source
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian +3 more
doaj +1 more source
Public key cryptography and error correcting codes as Ising models
We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes. In this approach, the transmitted codeword comprises Boolean sums of the original message bits selected by two randomly-constructed sparse ...
Kabashima, Yoshiyuki +2 more
core +1 more source
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source
Concurrent Knowledge-Extraction in the Public-Key Model [PDF]
Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the ...
Yao, Andrew C., Yung, Moti, Zhao, Yunlei
core +2 more sources

