Results 111 to 120 of about 405,500 (194)
SLC7A11 frequently migrates faster in SDS‐PAGE. The present study found that the high hydrophobicity of SLC7A11 causes its anomalous migration in SDS‐PAGE with a low concentration of acrylamide gel. Replacing isoleucine with asparagine reduced hydrophobicity and restored its normal migration at 55 kDa, revealing the role of hydrophobicity and gel ...
Nsengiyumva Emmanuel+13 more
wiley +1 more source
Unconditionally-secure and reusable public-key authentication [PDF]
We present a quantum-public-key identification protocol and show that it is secure against a computationally-unbounded adversary. This demonstrates for the first time that unconditionally-secure and reusable public-key authentication is possible in principle with (pure-state) public keys.
arxiv
Liver‐specific knockout of N6‐methyladenosine (m6A) methyltransferase METTL3 significantly accelerated hepatic tumor initiation under various oncogenic challenges, contrary to the previously reported oncogenic role of METTL3 in liver cancer cell lines or xenograft models. Mechanistically, METTL3 deficiency reduced m6A deposition on Manf transcripts and
Bo Cui+15 more
wiley +1 more source
Security Algorithms for Cloud Computing Environment [PDF]
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key.
arxiv
Possible role of human ribonuclease dicer in the regulation of R loops
R loops play an important role in regulating key cellular processes such as replication, transcription, centromere stabilization, or control of telomere length. However, the unscheduled accumulation of R loops can cause many diseases, including cancer, and neurodegenerative or inflammatory disorders. Interestingly, accumulating data indicate a possible
Klaudia Wojcik+2 more
wiley +1 more source
A new public key cryptography using generalized Fibonacci matrices [PDF]
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal+2 more
doaj
Group ring cryptography: Cryptography, key exchange, public key [PDF]
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are easily established. Authentication and signature schemes are implemented.
arxiv
Review of Lattice-based Public key Cryptography(Russian) [PDF]
This article presets a review of the achievements rapidly developing field of cryptography - public-key cryptography based on the lattice theory. Paper contains the necessary basic concepts and the major problems of the lattice theory, as well as together with the description on the benefits of this cryptography class - the properties of the ...
arxiv
Abstract In order to independently supervise the medical use of byproduct material, physicists in the United States (US) must legally meet the qualifications defined by the Nuclear Regulatory Commission (NRC) in the 35th part of the tenth title of the Code of Federal Regulations (§ 10 CFR Part 35). The American Board of Radiology (ABR) relinquished its
Christopher J. Tien+6 more
wiley +1 more source
Electronic Voting Protocol Using Identity-Based Cryptography
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia+1 more
doaj +1 more source