Results 91 to 100 of about 405,500 (194)
Quelques mathématiques de la cryptographie à clés publiques [PDF]
I present examples of mathematical objects that are of interest for public key cryptography. Text for the Journ\'ee Annuelle 2007 of the SMF.
arxiv
Exploration of heterogeneity and recurrence signatures in hepatocellular carcinoma
This study leveraged public datasets and integrative bioinformatic analysis to dissect malignant cell heterogeneity between relapsed and primary HCC, focusing on intercellular communication, differentiation status, metabolic activity, and transcriptomic profiles.
Wen‐Jing Wu+15 more
wiley +1 more source
Tropical cryptography II: extensions by homomorphisms [PDF]
We use extensions of tropical algebras as platforms for very efficient public key exchange protocols.
arxiv
Global DDoS Threat Landscape Tracking Network Anomalies using Elliptic Curve Cryptography [PDF]
Devices, such as in mobile devices or RFID. In brief, ECC based algorithms can be easily comprised into existing protocols to get the same retrograde compatibility and security with lesser resources.: Recent variants of Distributed Denial-of-Service ...
, K. Ravikumar, S. Soundharya
core +1 more source
TGF‐β has a complex role in cancer, exhibiting both tumor‐suppressive and tumor‐promoting properties. Using a series of differentiated tumoroids, derived from different stages and mutational background of colorectal cancer patients, we replicate this duality of TGF‐β in vitro. Notably, the atypical but highly aggressive KRASQ22K mutation rendered early‐
Theresia Mair+17 more
wiley +1 more source
Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj
New Directions in Multivariate Public Key Cryptography [PDF]
Most public key cryptosystems used in practice are based on integer factorization or discrete logarithms (in finite fields or elliptic curves). However, these systems suffer from two potential drawbacks.
Heindl, Raymond
core +1 more source
Germline variants in CDKN2A wild‐type melanoma prone families
Among melanoma‐prone families, wild‐type for CDKN2A and CDK4, some have pathogenic variants in genes not usually linked to melanoma. Furthermore, rare XP‐related variants and variants in MC1R are enriched in such families. Germline pathogenic variants in CDKN2A are well established as an underlying cause of familial malignant melanoma. While pathogenic
Gjertrud T. Iversen+5 more
wiley +1 more source
Trusted Certificates in Quantum Cryptography [PDF]
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv
Chronic TGF‐β exposure drives epithelial HCC cells from a senescent state to a TGF‐β resistant mesenchymal phenotype. This transition is characterized by the loss of Smad3‐mediated signaling, escape from senescence, enhanced invasiveness and metastatic potential, and upregulation of key resistance modulators such as MARK1 and GRM8, ultimately promoting
Minenur Kalyoncu+11 more
wiley +1 more source