Results 51 to 60 of about 80,772 (303)
New approach to practical leakage-resilient public-key cryptography
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols.
Chakraborty Suvradip+2 more
doaj +1 more source
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau+11 more
wiley +1 more source
Using decision problems in public key cryptography [PDF]
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now.
Shpilrain, Vladimir, Zapata, Gabriel
core +3 more sources
Inhibitor of DNA binding‐1 is a key regulator of cancer cell vasculogenic mimicry
Elevated expression of transcriptional regulator inhibitor of DNA binding 1 (ID1) promoted cancer cell‐mediated vasculogenic mimicry (VM) through regulation of pro‐angiogenic and pro‐cancerous genes (e.g. VE‐cadherin (CDH5), TIE2, MMP9, DKK1). Higher ID1 expression also increased metastases to the lung and the liver.
Emma J. Thompson+11 more
wiley +1 more source
Thompson’s Group and Public Key Cryptography [PDF]
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established protocols based on numeric computation. Notably, the protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al.
Vladimir Shpilrain, Alexander Ushakov
openaire +3 more sources
Analisis Dan Implementasi Algoritma Kriptografi Kunci Publik Rsa Dan Luc Untuk Penyandian Data [PDF]
The use of data communication networks between various computer systems have developed rapidly in various fields, so that the necessary existence of other systems maintain the confidentiality and security of data exchange.In handling the security and ...
Setiaji, B. (Bayu)
core
Cryptanalysis and improvement of an efficient certificateless signature scheme
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core +1 more source
This study used longitudinal transcriptomics and gene‐pattern classification to uncover patient‐specific mechanisms of chemotherapy resistance in breast cancer. Findings reveal preexisting drug‐tolerant states in primary tumors and diverse gene rewiring patterns across patients, converging on a few dysregulated functional modules. Despite receiving the
Maya Dadiani+14 more
wiley +1 more source
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez+17 more
wiley +1 more source
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin+5 more
doaj +1 more source