Results 71 to 80 of about 1,465,890 (271)
Wave-Shaped Round Functions and Primitive Groups [PDF]
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo +4 more
core +2 more sources
The kth order nonhomomorphicity of S-boxes
JUCS - Journal of Universal Computer Science Volume Nr.
Zheng, Yuliang, Zhang, Xian-Mo
openaire +3 more sources
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source
VLSI implementation of AES algorithm [PDF]
In the present era of information processing through computers and access of private information over the internet like bank account information even the transaction of money, business deal through video conferencing, encryption of the messages in ...
Kumar, Saurabh
core
Integration of circadian and hypoxia signaling via non‐canonical heterodimerization
CLOCK, BMAL1, and HIFs are basic helix‐loop‐helix and Per‐Arnt‐Sim domain (bHLH‐PAS) proteins, which function as transcription factors. bHLH‐PAS proteins are designated in two classes. Many class I proteins are regulated by environmental signals via their PAS domains, but such signals have not been identified for all.
Sicong Wang, Katja A. Lamia
wiley +1 more source
Finding an Effective Metric Used for Bijective S-Box Generation by Genetic Algorithms [PDF]
In cryptography, S-box is a basic component of symmetric key algorithms which performs nonlinear substitution. S-boxes need to be highly nonlinear, so that the cipher can resist linear cryptanalysis. The main criteria for cryptographically strong (n × n)
Baicheva, T. +6 more
core
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +6 more sources
S-boxes with Controllable Nonlinearity [PDF]
In this paper, we give some relationship between the nonlinearity of rational functions over F2n and the number of points of associated hyperelliptic curve. Using this, we get a lower bound on nonlinearity of rational-typed vector Boolean functions over F2n. While the previous works give us a lower bound on nonlinearity only for special-typed monomials,
Jung Hee Cheon +2 more
openaire +1 more source
Function‐driven design of a surrogate interleukin‐2 receptor ligand
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang +9 more
wiley +1 more source

