Results 91 to 100 of about 2,326,402 (364)
An Automated End-to-End Side Channel Analysis Based on Probabilistic Model
In this paper, we propose a new automated way to find out the secret exponent from a single power trace. We segment the power trace into subsignals that are directly related to recovery of the secret exponent.
Jeonghwan Hwang, Ji Won Yoon
doaj +1 more source
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe+2 more
doaj +1 more source
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
Multiprobe quantum spin Hall bars
We analyze electron transport in multiprobe quantum spin Hall (QSH) bars using the B\"{u}ttiker formalism and draw parallels with their quantum Hall (QH) counterparts.
Narayan, Awadhesh, Sanvito, Stefano
core +1 more source
Deep learning (DL) has proven to be very effective for image recognition tasks, with a large body of research on various model architectures for object classification.
Anh-Tuan Hoang+2 more
semanticscholar +1 more source
Systematic profiling of cancer‐fibroblast interactions reveals drug combinations in ovarian cancer
Fibroblasts, cells in the tumor environment, support ovarian cancer cell growth and alter morphology and drug response. We used fibroblast and cancer cell co‐culture models to test 528 drugs and discovered new drugs for combination treatment. We showed that adding Vorinostat or Birinapant to standard chemotherapy may improve drug response, suggesting ...
Greta Gudoityte+10 more
wiley +1 more source
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
—Profiled side-channel attacks represent a practical threat to digital devices, thereby having the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart cities.
S. Bhasin+5 more
semanticscholar +1 more source
Long non‐coding RNAs (lncRNAs) occupy an abundant fraction of the eukaryotic transcriptome and an emerging area in cancer research. Regulation by lncRNAs is based on their subcellular localization in HNSCC. This cartoon shows the various functions of lncRNAs in HNSCC discussed in this review.
Ellen T. Tran+3 more
wiley +1 more source
We investigate controlled phase separation of a binary Bose-Einstein condensate (BEC) in the proximity of mixed-spin-channel Feshbach resonance in the |F = 1, mF = +1> and |F = 2,mF = -1> states of 87Rb at a magnetic field of 9.10 G.
Hayashi, Taro+5 more
core +1 more source
In human monocytic cells THP‐1, a limited uptake of native—not oxidized—LDL/VLDL induced expression of scavenger receptor A and cellular adhesion. Induction was inhibited by lysosomotropic (WR‐1065) and lipophilic (BHT) antioxidants and by siRNAs against ferritinophagy.
Martina Čierna+4 more
wiley +1 more source