Results 91 to 100 of about 1,483,203 (289)

Key-Dependent S-Box Manipulations [PDF]

open access: yes, 1999
This paper discusses a method of enhancing the security of block ciphers which use s-boxes, a group which includes the ciphers DES, CAST-128, and Blowfish. We focus on CAST-128 and consider Blowfish; Biham and Biryukov [2] have made some similar proposals for DES.
Sandy Harris, Carlisle Adams
openaire   +1 more source

Calpain small subunit homodimerization is robust and calcium‐independent

open access: yesFEBS Letters, EarlyView.
Calpains dimerize via penta‐EF‐hand (PEF) domains. Using single‐molecule force spectroscopy, we measured the strength and kinetics of PEF–PEF homodimer binding. The interaction is robust, shows a transient conformational step before dissociation, and remains largely insensitive to Ca2+.
Nesha May O. Andoy   +4 more
wiley   +1 more source

Structural insights into an engineered feruloyl esterase with improved MHET degrading properties

open access: yesFEBS Letters, EarlyView.
A feruloyl esterase was engineered to mimic key features of MHETase, enhancing the degradation of PET oligomers. Structural and computational analysis reveal how a point mutation stabilizes the active site and reshapes the binding cleft, expading substrate scope.
Panagiota Karampa   +5 more
wiley   +1 more source

Exercice de style [PDF]

open access: yes, 2016
We present the construction and implementation of an 8-bit S-box with a differential and linear branch number of 3. We show an application by designing FLY, a simple block cipher based on bitsliced evaluations of the S-box and bit rotations that targets ...
Karpman, Pierre
core   +1 more source

A methionine‐lined active site governs carbocation stabilization and product specificity in a bacterial terpene synthase

open access: yesFEBS Letters, EarlyView.
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel   +13 more
wiley   +1 more source

Cellular automata based S-boxes

open access: yesCryptography and Communications, 2018
Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-boxes) having good cryptographic properties and low implementation costs. From the cryptographic perspective, up to now there have been only ad- hoc studies about specific kinds of CA, the best known example being the χ nonlinear transformation used in Keccak.
Luca Mariot   +3 more
openaire   +6 more sources

The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes

open access: yesFEBS Letters, EarlyView.
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga   +3 more
wiley   +1 more source

Practical Bijective S-box Design

open access: yes, 2013
We construct 8 x 8 bijective cryptographically strong S-boxes. Our construction is based on using non-bijective power functions over the finite filed.
Mamadolimov, Abdurashid   +2 more
openaire   +2 more sources

IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS [PDF]

open access: yes, 2016
Pembuatan Akun palsu yang digunakan untuk perbuatan tidak baik sangat merugikan dan membuat buruk citra pemilik dan situs media sosial atau situs jual beli online miliknya, oleh karena itu diperlukan tindakan pencegahan agar pengguna tidak mendaftarkan ...
Ramadhan, Iman Muhamad
core  

Organizing the interface—Plasma membrane architecture and receptor dynamics in virus‐cell interactions

open access: yesFEBS Letters, EarlyView.
Plasma membranes contain dynamic nanoscale domains that organize lipids and receptors. Because viruses operate at similar scales, this architecture shapes early infection steps, including attachment, receptor engagement, and entry. Using influenza A virus and HIV‐1 as examples, we highlight how receptor nanoclusters, multivalent glycan interactions ...
Jan Schlegel, Christian Sieben
wiley   +1 more source

Home - About - Disclaimer - Privacy