Results 91 to 100 of about 405,500 (194)

Quelques mathématiques de la cryptographie à clés publiques [PDF]

open access: yesarXiv, 2007
I present examples of mathematical objects that are of interest for public key cryptography. Text for the Journ\'ee Annuelle 2007 of the SMF.
arxiv  

Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma

open access: yesMolecular Oncology, EarlyView.
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu   +15 more
wiley   +1 more source

Tropical cryptography II: extensions by homomorphisms [PDF]

open access: yesarXiv, 2018
We use extensions of tropical algebras as platforms for very efficient public key exchange protocols.
arxiv  

Global DDoS Threat Landscape Tracking Network Anomalies using Elliptic Curve Cryptography [PDF]

open access: yes, 2018
Devices, such as in mobile devices or RFID. In brief, ECC based algorithms can be easily comprised into existing protocols to get the same retrograde compatibility and security with lesser resources.: Recent variants of Distributed Denial-of-Service ...
, K. Ravikumar, S. Soundharya
core   +1 more source

The atypical KRASQ22K mutation directs TGF‐β response towards partial epithelial‐to‐mesenchymal transition in patient‐derived colorectal cancer tumoroids

open access: yesMolecular Oncology, EarlyView.
TGF‐β has a complex role in cancer, exhibiting both tumor‐suppressive and tumor‐promoting properties. Using a series of differentiated tumoroids, derived from different stages and mutational background of colorectal cancer patients, we replicate this duality of TGF‐β in vitro. Notably, the atypical but highly aggressive KRASQ22K mutation rendered early‐
Theresia Mair   +17 more
wiley   +1 more source

Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj  

New Directions in Multivariate Public Key Cryptography [PDF]

open access: yes, 2009
Most public key cryptosystems used in practice are based on integer factorization or discrete logarithms (in finite fields or elliptic curves). However, these systems suffer from two potential drawbacks.
Heindl, Raymond
core   +1 more source

Germline variants in CDKN2A wild‐type melanoma prone families

open access: yesMolecular Oncology, EarlyView.
Among melanoma‐prone families, wild‐type for CDKN2A and CDK4, some have pathogenic variants in genes not usually linked to melanoma. Furthermore, rare XP‐related variants and variants in MC1R are enriched in such families. Germline pathogenic variants in CDKN2A are well established as an underlying cause of familial malignant melanoma. While pathogenic
Gjertrud T. Iversen   +5 more
wiley   +1 more source

Trusted Certificates in Quantum Cryptography [PDF]

open access: yesarXiv, 2006
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv  

Escape from TGF‐β‐induced senescence promotes aggressive hallmarks in epithelial hepatocellular carcinoma cells

open access: yesMolecular Oncology, EarlyView.
Chronic TGF‐β exposure drives epithelial HCC cells from a senescent state to a TGF‐β resistant mesenchymal phenotype. This transition is characterized by the loss of Smad3‐mediated signaling, escape from senescence, enhanced invasiveness and metastatic potential, and upregulation of key resistance modulators such as MARK1 and GRM8, ultimately promoting
Minenur Kalyoncu   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy