Results 51 to 60 of about 405,500 (194)
Public key cryptography and error correcting codes as Ising models
We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes. In this approach, the transmitted codeword comprises Boolean sums of the original message bits selected by two randomly-constructed sparse ...
Kabashima, Yoshiyuki+2 more
core +1 more source
Pseudo Random Generator Based Public Key Cryptography [PDF]
Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks.
Bhatia, K. (Kirti), Saini, N. (Neha)
core +1 more source
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić+31 more
wiley +1 more source
Applications of single-qubit rotations in quantum public-key cryptography
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
A. Kawachi+3 more
core +1 more source
MiR‐99a‐5p/miR‐100‐5p (functionally identical) and miR‐125b‐5p microRNAs are downregulated in malignant germ cell tumors (GCTs). Combination replenishment of these microRNAs using mimics resulted in growth inhibition in representative cell lines, with consequent downregulation of target genes involved in cell cycle (confirmed by flow cytometry) and ...
Marta Ferraresso+12 more
wiley +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
The mitosis‐related gene SKA1 was among 629 genes consistently dysregulated in OSCC across nine public gene expression datasets. In OSCC cell lines, SKA1 promoted proliferation and migration, enhanced radioresistance, and reduced radiation‐induced senescence.
Alexander Michael Grandits+7 more
wiley +1 more source
A New Class of Strongly Asymmetric PKA Algorithms: SAA-5
A new class of public key agreement (PKA) algorithms called strongly-asymmetric algorithms (SAA) was introduced in a previous paper by some of the present authors.
Luigi Accardi+3 more
doaj +1 more source
Consensus molecular subtypes (CMS1‐4) have been identified to study colorectal cancer heterogeneity and serve as potential biomarkers. In this study, we developed and evaluated NanoCMSer, a NanoString‐based classifier using 55 genes, optimized for FF and FFPE to facilitate the clinical evaluation of CMS subtyping.
Arezo Torang+10 more
wiley +1 more source
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin+5 more
doaj +1 more source