Results 61 to 70 of about 480,128 (291)

Finding an Effective Metric Used for Bijective S-Box Generation by Genetic Algorithms [PDF]

open access: yes, 2014
In cryptography, S-box is a basic component of symmetric key algorithms which performs nonlinear substitution. S-boxes need to be highly nonlinear, so that the cipher can resist linear cryptanalysis. The main criteria for cryptographically strong (n × n)
Baicheva, T.   +6 more
core  

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

IoT enabled data protection with substitution box for lightweight ciphers

open access: yesEgyptian Informatics Journal
Rapid growth in communication and networking demands the protection of highly sensitive data in the system. The cryptographic techniques used in various traditional devices and cloud environments are not applicable to resource-constrained devices like ...
K.B. Sarmila, S.V. Manisekaran
doaj   +1 more source

Secured Low Power Overhead Compensator Look-Up-Table (LUT) Substitution Box (S-Box) Architecture [PDF]

open access: yes2016 IEEE International Conference on Networking, Architecture and Storage (NAS), 2016
Substitution-Box (S-Box) is an important security building block for the Advanced Encryption Standard (AES) algorithm. However, its high power dissipation always compromises with its security feature under Correlation Power Analysis (CPA) attack. In this paper, we propose a secured and low power overhead LUT based S-Box architecture embodying a novel ...
Pammu, Ali Akbar   +2 more
openaire   +2 more sources

Аппаратная реализация преобразования SubBytes алгоритма шифрования Rijndael (AES) [PDF]

open access: yes, 2008
Проведено аналіз існуючих рішень апаратної реалізації підстановлюючого блоку S-Box, що є основою перетворення SuBytes алгоритму шифрування Rijndael. Виконано синтез, моделювання та верифікацію динамічних і функціональних характеристик найбільш поширених ...
Дербунович, Леонид Викторович   +1 more
core  

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

A novel design for the construction of safe S-boxes based on TDERC sequence

open access: yesAlexandria Engineering Journal, 2015
The focus of this article is to construct substitution box based on tangent delay for elliptic cavity chaotic sequence and a particular permutation of symmetric group of permutations. The analysis result shows that the proposed S-box is very good against
Ali Hussain Alkhaldi   +2 more
doaj   +1 more source

Обчислювальні характеристики підстановочно-перестановочних мереж з s-боксами розміром 16х16 біт [PDF]

open access: yes, 2011
В цій статті розглянута реалізація блочного шифру, який оснований на архітектурі гніздової постановочно-перестановочной сети (nested SPN), c блоками підстановки (S-боксами) розміром 16х16 біт в комп`ютерних системах.
Бевз, О. М.
core  

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes

open access: yesIEEE Access, 2021
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an image encryption technique based on multiple chaotic S-box was offered.
Ammar S. Alanazi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy