Results 111 to 120 of about 1,483,203 (289)
Morpheus: stream cipher for software & hardware applications [PDF]
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
A study of text-theoretical approach to S-box construction with image encryption applications. [PDF]
Mahboob A, Nadeem M, Rasheed MW.
europepmc +1 more source
Aptamers are used both therapeutically and as targeting agents in cancer treatment. We developed an aptamer‐targeted PLGA–TRAIL nanosystem that exhibited superior therapeutic efficacy in NOD/SCID breast cancer models. This nanosystem represents a novel biotechnological drug candidate for suppressing resistance development in breast cancer.
Gulen Melike Demirbolat +8 more
wiley +1 more source
An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box. [PDF]
Zheng J, Bao T.
europepmc +1 more source
For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-boxes (also called (n,m)-functions) relied on DPA attacks. We show that these properties are opposite to the non-linearity criterion and to the propagation criterion.
openaire +1 more source
IMPLEMENTASI ALGORITMA KRIPTOGRAFI DENGAN S-BOX DINAMIS BERGANTUNG PADA KUNCI UTAMA BERBASIS ADVANCED ENCRYPTION STANDARD (AES) [PDF]
Advanced Encryption Standard (AES) merupakan sebuah algoritma kriptografi yang ditetapkan National Institute of Standards and Technology (NIST) Amerika sebagai standar untuk algoritma enkripsi data elektronik.
Adhy, Satriyo +2 more
core
Eliminating Variables in Boolean Equation Systems [PDF]
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar +3 more
core +1 more source
The PI3Kδ inhibitor roginolisib (IOA‐244) preserves T‐cell function and activity
Identification of novel PI3K inhibitors with limited immune‐related adverse effects is highly sought after. We found that roginolisib and idelalisib inhibit chronic lymphocytic leukemia (CLL) cells and Treg suppressive functions to similar extents, but roginolisib affects cytotoxic T‐cell function and promotion of pro‐inflammatory T helper subsets to a
Elise Solli +7 more
wiley +1 more source
Novel Low-Power Construction of Chaotic S-Box in Multilayer Perceptron. [PDF]
Ren R, Su J, Yang B, Lau RYK, Liu Q.
europepmc +1 more source

