Results 51 to 60 of about 877,768 (275)
Diffusion‐based size determination of solute particles: a method adapted for postsynaptic proteins
We present a diffusion‐based approach for measuring the size of macromolecules and their complexes, and demonstrate its use on postsynaptic proteins. The method requires fluorescein‐labelled protein samples, a microfluidic device that maintains laminar flow for said samples, a microscope recording the emitted fluorescent signals, and an analytic ...
András László Szabó +7 more
wiley +1 more source
A new SNOW stream cipher called SNOW-V
In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment, something that can be expected to be relevant in a ...
P. Ekdahl +3 more
semanticscholar +1 more source
A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core +1 more source
QUAD: Overview and Recent Developments [PDF]
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006. The cipher relies on the iteration of a multivariate system of quadratic equations over a finite field, typically GF(2) or a ...
+4 more
core +2 more sources
Rethinking plastic waste: innovations in enzymatic breakdown of oil‐based polyesters and bioplastics
Plastic pollution remains a critical environmental challenge, and current mechanical and chemical recycling methods are insufficient to achieve a fully circular economy. This review highlights recent breakthroughs in the enzymatic depolymerization of both oil‐derived polyesters and bioplastics, including high‐throughput protein engineering, de novo ...
Elena Rosini +2 more
wiley +1 more source
PudgyTurtle Mode Resists Bit-Flipping Attacks
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj +1 more source
A New Lightweight Stream Cipher Based on Chaos
A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. This design can be used for efficient encryption in resource-constrained devices or environments. The chaotic system is quantified
Lina Ding +3 more
semanticscholar +1 more source
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart +4 more
wiley +1 more source
A New Random Keys Generator Depend on Multi Techniques [PDF]
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj +1 more source
Digital coherent PSK Y-00 quantum stream cipher with 217 randomized phase levels.
We report a 10-Gbaud fiber-optic cipher transmission system by using a phase-shift keying (PSK) Y-00 quantum stream cipher. The PSK Y-00 cipher is a symmetric-key direct data encryption technique based on extremely high-order random phase modulation ...
K. Tanizawa, F. Futami
semanticscholar +1 more source

