Results 201 to 210 of about 2,851 (239)
Geometrical Designs in Volumetric Bioprinting to Study Cellular Behaviors in Engineered Constructs
Curvature and spatial confinement guide cell behavior in volumetrically printed 3D constructs. Endothelial cells align and spread along specific geometries, while metastatic osteosarcoma cells proliferate independently of structural cues. Label‐free holographic microscopy captures real‐time, long‐term cell–material interactions, highlighting Gel‐PEG's ...
Julia Simińska‐Stanny +3 more
wiley +1 more source
Intranasally administered hUMSC‐derived exosomes modulate the CRYAB–ARRDC3–Drp1 axis, alleviating mitochondrial dysfunction and ferroptosis, enhancing neuronal survival, reducing oxidative stress, and promoting functional recovery in ischemia‐reperfusion injury, offering a promising therapeutic strategy for ischemic stroke.
Rong ji +7 more
wiley +1 more source
Performance enhancement of DSSS using rabbit Stream cipher
Over the last 50 years, a class of modulation techniques usually called “Spread Spectrum,” has been developed. This group of modulation techniques is characterized by its wide frequency spectra. The modulated output signals occupy a much greater bandwidth than the signal's baseband information bandwidth.
S. Sharmila, G. Umamaheshwari
openaire +2 more sources
Enhanced Stream Cipher Rabbit Secure Against Power Analysis Attack
Recently, stream cipher Rabbit was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. However, a feasibility of practical power analysis attack to algorithm in experiment was introduced.
KiSeok Bae +3 more
openaire +2 more sources
ASIC Implementation of Rabbit Stream Cipher Encryption for Data
Over a network to secure information and to remain confidential cryptography plays a very important role in today’s life. Cryptography is an method of converting information to a non-understandable form and then being able to convert it to the understandable form by the recipient.
Prathima N., Chetan S., Syed M. Rehman
openaire +2 more sources
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)
Recently, there has been extensive research on mobile devices and stream cipher to increase security. The Rabbit stream cipher was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorithms of the ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization. As the Rabbit evaluated the complexity of side-channel analysis
KiSeok Bae +4 more
openaire +2 more sources
Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher
In this paper a two Special Huffman Tree (SHT) algorithms have been designed and implemented to be encoded with an MPEG video file instead of the standard Huffman tree algorithm. The first SHT has been built with 89-entries, and the other with 100-entries. The SHTs are encrypted using part of the key-stream generated by Rabbit algorithm. The other part
Sufyan T. Faraj Al-Janabi +2 more
openaire +2 more sources
Hardware Framework for the Rabbit Stream Cipher
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit's strength against modern attacks;
Deian Stefan
openaire +2 more sources
Comparison the insertion attack effects on randomness property of Dragon and Rabbit stream cipher
Pseudorandom generator as the heart of security system is a potential target by an adversary to weaken or derail the system performance. One possible active attack on a pseudorandom generator is an insertion attack on a random sequence generated by the pseudo random number generator, in order to reduce or even omit the randomness property of the output
Desi Wulandari +3 more
openaire +2 more sources

