Results 71 to 80 of about 80,772 (303)
First end‐to‐end PQC protected DPU‐to‐DPU communications
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera+4 more
doaj +1 more source
Public-key cryptography and invariant theory
Public-key cryptosystems are suggested based on invariants of groups.
Grigoriev, D.
core +1 more source
Unraveling LINE‐1 retrotransposition in head and neck squamous cell carcinoma
The novel RetroTest method allows the detection of L1 activation in clinical samples with low DNA input, providing global L1 activity and the identification of the L1 source element. We applied RetroTest to a real‐world cohort of HNSCC patients where we reported an early L1 activation, with more than 60% of T1 patients showing L1 activity.
Jenifer Brea‐Iglesias+12 more
wiley +1 more source
Some cryptographic algorithms [PDF]
Cryptography is the practice and study of techniques for secure communication in the presence of third parties, called adversaries. Modern cryptography is heavily based on mathematical theory and computer science practice.
Satpathy, S
core
Cotargeting EGFR and STAT3 with Erlotinib and TTI‐101 impairs both 2D and 3D growth of ETV1‐overexpressing prostate cancer cells by disrupting a self‐sustaining ETV1–EGFR positive feedback loop that promotes EGFR and STAT3 expression and phosphorylation (activation).
Elsa Gomes Paiva+5 more
wiley +1 more source
Quantum Key Distribution for V2I communications with software‐defined networking
The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact.
Alexandros Stavdas+9 more
doaj +1 more source
In thyroid cancer patients, high‐dose (≥7.4 GBq) radioactive iodine therapy (RAIT) was associated with a higher prevalence of clonal hematopoiesis (variant allele frequency >2%) in individuals aged ≥50 years (OR = 2.44). In silico analyses showed that truncating PPM1D mutations conferred a selective advantage under these conditions.
Jaeryuk Kim+11 more
wiley +1 more source
Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj +1 more source
Survey on SAP and its application in public-key cryptography
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj +1 more source
Image Security using Visual Cryptography [PDF]
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information ...
Bhuyan, Sangeeta
core