Results 81 to 90 of about 15,909 (208)

MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]

open access: yes, 2018
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph   +2 more
core   +2 more sources

Massive Sampling Strategy for Antibody–Antigen Targets in CAPRI Round 55 With MassiveFold

open access: yesProteins: Structure, Function, and Bioinformatics, EarlyView.
ABSTRACT Massive sampling with AlphaFold2 improves protein–protein complex predictions. This has been shown during the last CASP15‐CAPRI blind prediction round by the AFsample tool. However, more difficult targets including antibody–antigen binding remain challenging. CAPRI Round 55 consisted of three antibody–antigen targets and one heterotrimer.
Nessim Raouraoua   +2 more
wiley   +1 more source

The mF mode of authenticated encryption with associated data

open access: yesJournal of Mathematical Cryptology, 2022
In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption.
Chakraborty Bishwajit, Nandi Mridul
doaj   +1 more source

From Membrane Composition to Antimicrobial Strategies: Experimental and Computational Approaches to AMP Design and Selectivity

open access: yesSmall, EarlyView.
Antimicrobial peptides (AMPs) are promising candidates for next‐generation antibiotics, acting through mechanisms such as membrane disruption and intracellular targeting. This review examines how variations in bacterial membrane composition critically influence AMP activity.
Paolo Rossetti   +5 more
wiley   +1 more source

BEANIE – A 32-bit Cipher for Cryptographic Mitigations Against Software Attacks

open access: yesIACR Transactions on Symmetric Cryptology
In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks
Simon Gerhalter   +9 more
doaj   +1 more source

“I'm a Good Guy Who Deserves Better, Yet Nobody Wants to Give me Better”: The Accounts of Nice Guys

open access: yesSymbolic Interaction, EarlyView.
Within Western popular culture and online discourse, a “Nice Guy” is someone who enacts niceness for which they believe they are owed, deserving of, or entitled to something in return—especially the romantic or sexual attention of women. In this study, we examine the use of accounts in personal narratives told in an anonymous online discussion forum ...
Brooke Weinmann, Dennis D. Waskul
wiley   +1 more source

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers

open access: yesIACR Cryptology ePrint Archive
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati   +3 more
semanticscholar   +1 more source

Labour's Planning Reform: A View from London

open access: yesThe Political Quarterly, EarlyView.
Abstract This article examines the English planning reform agenda of the Labour government elected in 2024. It frames London's outer boroughs as a critical lens through which to assess it. Drawing on the findings of the cross‐party Suburban Taskforce (2020–2022), the article has particular regard to the proposed reconfiguration of planning committees ...
Dimitrios Panayotopoulos‐Tsiros   +2 more
wiley   +1 more source

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

open access: yes, 2017
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca   +11 more
core   +1 more source

Elastic Block Ciphers: Method, Security and Instantiations [PDF]

open access: yes, 2009
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L.   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy