Results 71 to 80 of about 336,639 (325)

Optimal Collision Side-Channel Attacks [PDF]

open access: yes, 2020
Collision side-channel attacks are effective attacks against cryptographic implementations, however, optimality and efficiency of collision side-channel attacks is an open question. In this paper, we show that collision side-channel attacks can be derived using maximum likelihood principle when the distribution of the values of the leakage function is ...
Vincent Grosso, Cezary Glowacz
openaire   +2 more sources

Secure and Computationally-Efficient Cryptographic Primitive based on Cellular Automation

open access: yes, 2019
Mageto, a random number generator based on one-dimensional cellular automaton (CA) is presented. Three procedures of secure implementation using Mageto is proposed and discussed. Implementations are very efficient in a wide range of hardware and software
Vuckovac, Rade
core   +1 more source

Exploring patients’ profiles associated with the resolution of acute calcium pyrophosphate arthritis treatedwith colchicine and prednisone: post hoc analysis of a randomized controlled trial

open access: yesArthritis Care &Research, Accepted Article.
Objective The objective was to identify factors determining acute arthritis resolution and safety with colchicine and prednisone in acute calcium pyrophosphate (CPP) crystal arthritis. Methods We conducted a post hoc analysis of the COLCHICORT trial, which compared colchicine and prednisone for the treatment of acute CPP crystal arthritis, using a ...
Tristan Pascart   +14 more
wiley   +1 more source

Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack

open access: yesIEEE Access, 2020
Recent work has shown that the timing behavior of a real-time system can be utilized by attackers for various adverse purposes via schedule-based timing side-channel attacks.
Songran Liu, Wang Yi
doaj   +1 more source

Fecal Microbiota Transplantation Modulates Th17/Treg Balance via JAK/STAT Pathway in ARDS Rats

open access: yesAdvanced Biology, EarlyView.
Fecal microbiota transplantation (FMT) alleviates lung and intestinal injury in lipopolysaccharide (LPS)‐induced acute respiratory distress syndrome (ARDS) in rats. This study demonstrates that FMT restores the balance between Th17 and Treg cells, inhibits the JAK/STAT pathway, and modulates cytokine levels, reducing inflammation and lung damage. These
Dongwei Zhang   +8 more
wiley   +1 more source

Microphysiological Glomerular Filtration Barriers: Current Insights, Innovations, and Future Applications

open access: yesAdvanced Biology, EarlyView.
The glomerular filtration barrier (GFB) is the first step of blood filtration by the kidneys. The concerning increase of kidney diseases makes the development of new models essential. In this context, microphysiological glomerular filtration barriers focus on closely reproducing the physiological architecture of the in vivo GFB: podocytes, glomerular ...
Manon Miran   +5 more
wiley   +1 more source

Investigating the Cellular Effects of GALC Dosing in Enzyme Replacement Therapy for Krabbe Disease Supports the Role of Nanomedicine

open access: yesAdvanced Biology, EarlyView.
A detailed workflow for recombinant GALC production and characterization is presented to support enzyme replacement therapy for Krabbe disease. In vitro assays demonstrate that physiological GALC doses restore enzymatic activity and autophagic flux without affecting cell viability, whereas higher doses impair autophagy and reduce viability.
Ambra Del Grosso   +5 more
wiley   +1 more source

Enhancing non-profiled side-channel attacks by time-frequency analysis

open access: yesCybersecurity, 2023
Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of SCA, the number of attack data directly determines the performance of SCA.
Chengbin Jin, Yongbin Zhou
doaj   +1 more source

On the Machine Learning Techniques for Side-channel Analysis [PDF]

open access: yes, 2016
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain   +2 more
core  

Infrared Neural Stimulation Elicits Distinct Molecular Pathways in Astrocytes Based on Laser Pulse Parameters

open access: yesAdvanced Biology, EarlyView.
Infrared (IR) light evokes distinct calcium and water transport responses in astrocytes, depending on stimulation duration and protocol. This study uses widefield imaging and pharmacology to reveal differential engagement of astroglial signaling pathways.
Wilson R. Adams   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy