Results 71 to 80 of about 336,639 (325)
Optimal Collision Side-Channel Attacks [PDF]
Collision side-channel attacks are effective attacks against cryptographic implementations, however, optimality and efficiency of collision side-channel attacks is an open question. In this paper, we show that collision side-channel attacks can be derived using maximum likelihood principle when the distribution of the values of the leakage function is ...
Vincent Grosso, Cezary Glowacz
openaire +2 more sources
Secure and Computationally-Efficient Cryptographic Primitive based on Cellular Automation
Mageto, a random number generator based on one-dimensional cellular automaton (CA) is presented. Three procedures of secure implementation using Mageto is proposed and discussed. Implementations are very efficient in a wide range of hardware and software
Vuckovac, Rade
core +1 more source
Objective The objective was to identify factors determining acute arthritis resolution and safety with colchicine and prednisone in acute calcium pyrophosphate (CPP) crystal arthritis. Methods We conducted a post hoc analysis of the COLCHICORT trial, which compared colchicine and prednisone for the treatment of acute CPP crystal arthritis, using a ...
Tristan Pascart+14 more
wiley +1 more source
Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack
Recent work has shown that the timing behavior of a real-time system can be utilized by attackers for various adverse purposes via schedule-based timing side-channel attacks.
Songran Liu, Wang Yi
doaj +1 more source
Fecal Microbiota Transplantation Modulates Th17/Treg Balance via JAK/STAT Pathway in ARDS Rats
Fecal microbiota transplantation (FMT) alleviates lung and intestinal injury in lipopolysaccharide (LPS)‐induced acute respiratory distress syndrome (ARDS) in rats. This study demonstrates that FMT restores the balance between Th17 and Treg cells, inhibits the JAK/STAT pathway, and modulates cytokine levels, reducing inflammation and lung damage. These
Dongwei Zhang+8 more
wiley +1 more source
The glomerular filtration barrier (GFB) is the first step of blood filtration by the kidneys. The concerning increase of kidney diseases makes the development of new models essential. In this context, microphysiological glomerular filtration barriers focus on closely reproducing the physiological architecture of the in vivo GFB: podocytes, glomerular ...
Manon Miran+5 more
wiley +1 more source
A detailed workflow for recombinant GALC production and characterization is presented to support enzyme replacement therapy for Krabbe disease. In vitro assays demonstrate that physiological GALC doses restore enzymatic activity and autophagic flux without affecting cell viability, whereas higher doses impair autophagy and reduce viability.
Ambra Del Grosso+5 more
wiley +1 more source
Enhancing non-profiled side-channel attacks by time-frequency analysis
Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of SCA, the number of attack data directly determines the performance of SCA.
Chengbin Jin, Yongbin Zhou
doaj +1 more source
On the Machine Learning Techniques for Side-channel Analysis [PDF]
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain+2 more
core
Infrared (IR) light evokes distinct calcium and water transport responses in astrocytes, depending on stimulation duration and protocol. This study uses widefield imaging and pharmacology to reveal differential engagement of astroglial signaling pathways.
Wilson R. Adams+7 more
wiley +1 more source