Results 61 to 70 of about 880,434 (384)
PudgyTurtle Mode Resists Bit-Flipping Attacks
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj +1 more source
Digital coherent PSK Y-00 quantum stream cipher with 217 randomized phase levels.
We report a 10-Gbaud fiber-optic cipher transmission system by using a phase-shift keying (PSK) Y-00 quantum stream cipher. The PSK Y-00 cipher is a symmetric-key direct data encryption technique based on extremely high-order random phase modulation ...
K. Tanizawa, F. Futami
semanticscholar +1 more source
Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu+7 more
wiley +1 more source
A New Random Keys Generator Depend on Multi Techniques [PDF]
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj +1 more source
MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov+14 more
core +3 more sources
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi+2 more
wiley +1 more source
A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core +1 more source
Accounting for TLD response to CBCT protocols in external beam radiotherapy dose monitoring
Abstract Purpose LiF thermoluminescent dosimeters (TLDs) are commonly used in radiation therapy to verify the delivered dose. Examples include dose verification for complicated treatment setups or cardiovascular implantable electronic devices (CIEDs). TLDs may be present for both the pre‐treatment imaging kilovoltage (kV) beam and the megavoltage (MV ...
Andrew J. White+5 more
wiley +1 more source
SUATU ALGORITMA KRIPTOGRAFI STREAM CIPHER BERDASARKAN FUNGSI CHAOS [PDF]
Salah satu sifat fungsi chaos adalah sensitif terhadap nilai awal, artinya perubahan kecil pada nilai awal akan mengakibatkan perubahan besar pada nilai fungsi selanjutnya.
Dwi, Lestari, Muhamad Zaki, Riyanto
core
Quantum Noise Randomized Ciphers
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom+13 more
core +1 more source