Results 81 to 90 of about 15,909 (208)
MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph +2 more
core +2 more sources
Massive Sampling Strategy for Antibody–Antigen Targets in CAPRI Round 55 With MassiveFold
ABSTRACT Massive sampling with AlphaFold2 improves protein–protein complex predictions. This has been shown during the last CASP15‐CAPRI blind prediction round by the AFsample tool. However, more difficult targets including antibody–antigen binding remain challenging. CAPRI Round 55 consisted of three antibody–antigen targets and one heterotrimer.
Nessim Raouraoua +2 more
wiley +1 more source
The mF mode of authenticated encryption with associated data
In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption.
Chakraborty Bishwajit, Nandi Mridul
doaj +1 more source
Antimicrobial peptides (AMPs) are promising candidates for next‐generation antibiotics, acting through mechanisms such as membrane disruption and intracellular targeting. This review examines how variations in bacterial membrane composition critically influence AMP activity.
Paolo Rossetti +5 more
wiley +1 more source
BEANIE – A 32-bit Cipher for Cryptographic Mitigations Against Software Attacks
In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks
Simon Gerhalter +9 more
doaj +1 more source
“I'm a Good Guy Who Deserves Better, Yet Nobody Wants to Give me Better”: The Accounts of Nice Guys
Within Western popular culture and online discourse, a “Nice Guy” is someone who enacts niceness for which they believe they are owed, deserving of, or entitled to something in return—especially the romantic or sexual attention of women. In this study, we examine the use of accounts in personal narratives told in an anonymous online discussion forum ...
Brooke Weinmann, Dennis D. Waskul
wiley +1 more source
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati +3 more
semanticscholar +1 more source
Labour's Planning Reform: A View from London
Abstract This article examines the English planning reform agenda of the Labour government elected in 2024. It frames London's outer boroughs as a critical lens through which to assess it. Drawing on the findings of the cross‐party Suburban Taskforce (2020–2022), the article has particular regard to the proposed reconfiguration of planning committees ...
Dimitrios Panayotopoulos‐Tsiros +2 more
wiley +1 more source
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca +11 more
core +1 more source
Elastic Block Ciphers: Method, Security and Instantiations [PDF]
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L. +2 more
core +3 more sources

