Results 71 to 80 of about 405,500 (194)
A SAT-based Public Key Cryptography Scheme [PDF]
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT formula satisfied by the private key. Probabilistic encryption generates functions implied to be false by the public key XOR the message bits. A zero-knowledge proof is used to provide signatures.
arxiv
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
Public Key Cryptography for 5G Private Identification [PDF]
Den neste generasjonen mobilnett blir kalt 5G. 5G introduserer flere forbedringer i forhold til den forrige generasjonen, kjent som Long Term Evolution (LTE). Noen av disse forbedringene gjelder personvernet til abonnentene.
Halland, Julie Fylkesnes
core
Molecular and functional profiling unravels targetable vulnerabilities in colorectal cancer
We used whole exome and RNA‐sequencing to profile divergent genomic and transcriptomic landscapes of microsatellite stable (MSS) and microsatellite instable (MSI) colorectal cancer. Alterations were classified using a computational score for integrative cancer variant annotation and prioritization.
Efstathios‐Iason Vlachavas+15 more
wiley +1 more source
Assessment of Work Pedestal on RSA in Text Cryptographic System [PDF]
Cryptography is a Greek word, crypto signifies ‘hidden or covered up’ and graphy means ‘study’. The conversion of plain text to cipher text is called as encryption and changing the cipher text to plain text is called as decryption.
Panwar , Aashish+2 more
core +1 more source
Pancreatic ductal adenocarcinoma patient‐derived xenografts (PDAC‐PDXs) engrafted orthotopically in the pancreas of immunodeficient mice retain the main genetic and histopathological characteristics of the original human tumors. A 294 stroma gene signature differentiates between PDAC‐PDXs that are responsive to gemcitabine plus nab‐paclitaxel versus ...
Alessia Anastasia+13 more
wiley +1 more source
Discovery of Elliptic Curve Cryptographic Private Key in O(n) [PDF]
An algorithm is presented that in context of public key use of Elliptic Curve Cryptography allows discovery of the private key in worst case O(n).
arxiv
Analisis Dan Implementasi Algoritma Kriptografi Kunci Publik Rsa Dan Luc Untuk Penyandian Data [PDF]
The use of data communication networks between various computer systems have developed rapidly in various fields, so that the necessary existence of other systems maintain the confidentiality and security of data exchange.In handling the security and ...
Setiaji, B. (Bayu)
core
Classification of acute myeloid leukemia based on multi‐omics and prognosis prediction value
The Unsupervised AML Multi‐Omics Classification System (UAMOCS) integrates genomic, methylation, and transcriptomic data to categorize AML patients into three subtypes (UAMOCS1‐3). This classification reveals clinical relevance, highlighting immune and chromosomal characteristics, prognosis, and therapeutic vulnerabilities.
Yang Song+13 more
wiley +1 more source
A Matrix Public Key Cryptosystem [PDF]
We discuss a matrix public key cryptosystem and its numerical implementation.
arxiv