Results 51 to 60 of about 1,483,203 (289)
A Novel Optimization Method for Constructing Cryptographically Strong Dynamic S-Boxes
The resistance of S-box-based cryptosystems to linear cryptanalysis is often determined by the nonlinearity (NL) and the linear approximation probability (LAP) of the underlying S-box.
Saleh Ibrahim, Alaa M. Abbas
doaj +1 more source
Analysing Relations involving small number of Monomials in AES S- Box [PDF]
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES.
Ghosal, Riddhi
core +1 more source
Germline TP53 Mutations Causing Diamond–Blackfan Anemia: A French Report
ABSTRACT Diamond–Blackfan anemia is a rare congenital erythroblastopenia typically caused by mutations in ribosomal protein genes. Recently, gain‐of‐function mutations in TP53 have been identified as a novel cause of Diamond–Blackfan anemia. We report two French patients who both harbored a heterozygous TP53 deletion (NM_000546.5: c.1077delA; p ...
Rafael Moisan +6 more
wiley +1 more source
A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes [PDF]
The present paper explains the development of an innovative cryptographic system designed to encrypt color images at the pixel level. This technique relies on a significant enhancement of the conventional Vigenere method, incorporating the implementation
Chemlal Abdelhakim +5 more
doaj +1 more source
S-Box Hashing for Text Mining [PDF]
One of the crucial points in the text mining studies is the feature hashing step. Most of the text mining studies starts with a text data source and processes a feature extraction methodology over the text.
Mert, Cihan, Seker, Sadi Evren
core
A Novel String Distance Function based on Most Frequent K Characters [PDF]
This study aims to publish a novel similarity metric to increase the speed of comparison operations. Also the new metric is suitable for distance-based operations among strings.
Altun, Oguz +3 more
core +1 more source
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti +12 more
wiley +1 more source
A Substitution Box for Lightweight Ciphers to Secure Internet of Things
The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security.
V. Panchami, Mahima Mary Mathews
doaj +1 more source
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +6 more sources
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich +5 more
wiley +1 more source

