Cellular Self-Destruct Program Has Deep Roots throughout Evolution

نویسندگان

چکیده

منابع مشابه

Social Evolution: This Microbe Will Self-Destruct

Phenotypic noise and social evolution in microbes have recently attracted huge interdisciplinary interest. A new study highlights the interaction between these phenomena and its implications for self-destructive cooperation.

متن کامل

Self-Destruct Non-Malleability

We introduce a new security notion for public-key encryption (PKE) that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA), which appears to be the strongest natural PKE security notion below full-blown chosen-ciphertext (IND-CCA) security. In this notion, the adversary is allowed to ask many adaptive “parallel” decryption queries (i.e., a query consists of many ci...

متن کامل

Stanniocalcin Has Deep Evolutionary Roots in Eukaryotes

Vertebrates have a large glycoprotein hormone, stanniocalcin, which originally was shown to inhibit calcium uptake from the environment in teleost fish gills. Later, humans, other mammals, and teleost fish were shown to have two forms of stanniocalcin (STC1 and STC2) that were widely distributed in many tissues. STC1 is associated with calcium and phosphate homeostasis and STC2 with phosphate, ...

متن کامل

Tamper Resilient Cryptography Without Self-Destruct

We initiate a general study of schemes resilient to both tampering and leakage attacks. Tampering attacks are powerful cryptanalytic attacks where an adversary can change the secret state and observes the effect of such changes at the output. Our contributions are outlined below: 1. We propose a general construction showing that any cryptographic primitive where the secret key can be chosen as ...

متن کامل

Putting Your Passwords on Self Destruct Mode

In this paper, we explore the challenge of Password Fatigue, which is essentially the difficulty involved with having too many passwords to remember and manage. The systemic failure to recognize the problem in the context of people's time and attention results in numerous security exposures due to bad habits and inappropriate shortcuts. To address this issue, we examine the concept of ephemeral...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Molecular Biology and Evolution

سال: 2014

ISSN: 0737-4038,1537-1719

DOI: 10.1093/molbev/msu291