Results 71 to 80 of about 1,465,890 (271)

Wave-Shaped Round Functions and Primitive Groups [PDF]

open access: yes, 2018
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo   +4 more
core   +2 more sources

The kth order nonhomomorphicity of S-boxes

open access: yes1999 Information Theory and Networking Workshop (Cat. No.99EX371), 2003
JUCS - Journal of Universal Computer Science Volume Nr.
Zheng, Yuliang, Zhang, Xian-Mo
openaire   +3 more sources

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

VLSI implementation of AES algorithm [PDF]

open access: yes, 2013
In the present era of information processing through computers and access of private information over the internet like bank account information even the transaction of money, business deal through video conferencing, encryption of the messages in ...
Kumar, Saurabh
core  

Integration of circadian and hypoxia signaling via non‐canonical heterodimerization

open access: yesFEBS Letters, EarlyView.
CLOCK, BMAL1, and HIFs are basic helix‐loop‐helix and Per‐Arnt‐Sim domain (bHLH‐PAS) proteins, which function as transcription factors. bHLH‐PAS proteins are designated in two classes. Many class I proteins are regulated by environmental signals via their PAS domains, but such signals have not been identified for all.
Sicong Wang, Katja A. Lamia
wiley   +1 more source

Finding an Effective Metric Used for Bijective S-Box Generation by Genetic Algorithms [PDF]

open access: yes, 2014
In cryptography, S-box is a basic component of symmetric key algorithms which performs nonlinear substitution. S-boxes need to be highly nonlinear, so that the cipher can resist linear cryptanalysis. The main criteria for cryptographically strong (n × n)
Baicheva, T.   +6 more
core  

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

S-boxes with Controllable Nonlinearity [PDF]

open access: yes, 1999
In this paper, we give some relationship between the nonlinearity of rational functions over F2n and the number of points of associated hyperelliptic curve. Using this, we get a lower bound on nonlinearity of rational-typed vector Boolean functions over F2n. While the previous works give us a lower bound on nonlinearity only for special-typed monomials,
Jung Hee Cheon   +2 more
openaire   +1 more source

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy