Results 51 to 60 of about 435,325 (313)
A New Method for Generating High Non-linearity S-Boxes [PDF]
Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of crypto-attacks has led to the development of criteria for repelling such attacks.
Tesar, P.
core +1 more source
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secret-key block ciphers. This choice directly induces the classical version of the differential attack by the use of XOR-kind ...
Biham E. +10 more
core +3 more sources
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley +1 more source
Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley +1 more source
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System
Over the last few decades, different mediums of secure communication use chaos which is demonstrated by some nonlinear dynamical systems. Chaos shows unpredictable behavior and this characteristic is quite helpful in different encryption techniques and ...
Sajjad Shaukat Jamal +4 more
doaj +1 more source
An Efficient Image Encryption Scheme Based on S-Boxes and Fractional-Order Differential Logistic Map
In this work, an efficient image encryption based on S-boxes and fractional-order logistic map is proposed. The features of the fractional-order chaotic system in dynamical behaviors are exhibited.
Ying-Qian Zhang +2 more
doaj +1 more source
Low-Latency Boolean Functions and Bijective S-boxes
In this paper, we study the gate depth complexity of (vectorial) Boolean functions in the basis of {NAND, NOR, INV} as a new metric, called latency complexity, to mathematically measure the latency of Boolean functions.
Shahram Rasoolzadeh
doaj +1 more source
Порівняльний аналіз методів побудови та властивостей S-блоків ряду сучасних криптографічних алгоритмів [PDF]
Розглянуто методи побудови та властивості збалансованих булевих відображень (S-блоків) нелінійних вузлів ускладнення сучасних криптографічних алгоритмів.
Дирда, Олександр +1 more
core
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source
S-boxes are the most popular nonlinear building blocks used in symmetrickey primitives. Both cryptographic properties and implementation cost of an S-box are crucial for a good cipher design, especially for lightweight ones. This paper aims to determine
Chenhao Jia +6 more
doaj +1 more source

