Results 111 to 120 of about 1,483,203 (289)

Morpheus: stream cipher for software & hardware applications [PDF]

open access: yes, 2007
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core  

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

TRAIL‐PEG‐Apt‐PLGA nanosystem as an aptamer‐targeted drug delivery system potential for triple‐negative breast cancer therapy using in vivo mouse model

open access: yesMolecular Oncology, EarlyView.
Aptamers are used both therapeutically and as targeting agents in cancer treatment. We developed an aptamer‐targeted PLGA–TRAIL nanosystem that exhibited superior therapeutic efficacy in NOD/SCID breast cancer models. This nanosystem represents a novel biotechnological drug candidate for suppressing resistance development in breast cancer.
Gulen Melike Demirbolat   +8 more
wiley   +1 more source

DPA Attacks and S-Boxes [PDF]

open access: yes, 2005
For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-boxes (also called (n,m)-functions) relied on DPA attacks. We show that these properties are opposite to the non-linearity criterion and to the propagation criterion.
openaire   +1 more source

IMPLEMENTASI ALGORITMA KRIPTOGRAFI DENGAN S-BOX DINAMIS BERGANTUNG PADA KUNCI UTAMA BERBASIS ADVANCED ENCRYPTION STANDARD (AES) [PDF]

open access: yes
Advanced Encryption Standard (AES) merupakan sebuah algoritma kriptografi yang ditetapkan National Institute of Standards and Technology (NIST) Amerika sebagai standar untuk algoritma enkripsi data elektronik.
Adhy, Satriyo   +2 more
core  

Eliminating Variables in Boolean Equation Systems [PDF]

open access: yes, 2017
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar   +3 more
core   +1 more source

The PI3Kδ inhibitor roginolisib (IOA‐244) preserves T‐cell function and activity

open access: yesMolecular Oncology, EarlyView.
Identification of novel PI3K inhibitors with limited immune‐related adverse effects is highly sought after. We found that roginolisib and idelalisib inhibit chronic lymphocytic leukemia (CLL) cells and Treg suppressive functions to similar extents, but roginolisib affects cytotoxic T‐cell function and promotion of pro‐inflammatory T helper subsets to a
Elise Solli   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy