نتایج جستجو برای: 128

تعداد نتایج: 21232  

2015
Eleonora Franzoni Sam A Booker Srinivas Parthasarathy Frederick Rehfeld Sabine Grosser Swathi Srivatsa Heiko R Fuchs Victor Tarabykin Imre Vida F Gregory Wulczyn

miR-128, a brain-enriched microRNA, has been implicated in the control of neurogenesis and synaptogenesis but its potential roles in intervening processes have not been addressed. We show that post-transcriptional mechanisms restrict miR-128 accumulation to post-mitotic neurons during mouse corticogenesis and in adult stem cell niches. Whereas premature miR-128 expression in progenitors for upp...

الگوریتم رمز دنباله‌یی (Welch - Gong) WG، یک الگوریتم رمز با کلیدی با طول متغیر ۸۰، ۹۶، ۱۱۲ و ۱۲۸ بیت است که با هدف شرکت در گروه ۲ پروژه‌ی eSTREAM طراحی شده است. در این نوشتار به تحلیل الگوریتم رمز دنباله‌یی 128- WG، و بررسی میزان مقاومت آن دربرابر حمله‌ی تمایز مبتنی بر تقریب خطی پرداخته‌ایم. با یافتن یک نقاب خطی مناسب برای بخش غیرخطی 128- WG، حمله‌ی تمایز به الگوریتم- ساده‌شده )بدون در نظر گ...

Sleep plays a vital role in regulating physiological mechanisms in the human body. Nowadays, by the change of lifestyle and as a consequence of longer work hours and increased accessibility to media, sleep disturbance becomes a common problem in modern society. Many studies demonstrated that sleep disturbance triggers a systemic low-grade inflammation by increasing the level of several cytokine...

2015
Chen Li Jian-Feng Cui Min-Bin Chen Chao-Ying Liu Feng Liu Qian-De Zhang Jian Zou Pei-Hua Lu

The colorectal cancer is the leading contributor of cancer-related mortality. Mammalian target of rapamycin (mTOR), existing in 2 complexes (mTORC1/2), is frequently dysregulated and constitutively activated in colorectal cancers. It represents an important drug target. Here we found that INK-128, the novel ATP-competitive kinase inhibitor of mTOR, blocked both mTORC1 and mTORC2 activation in c...

Journal: :Oncology reports 2013
Lina Lin Xulin Chen Xuelin Peng Jianwen Zhou Hsiang-Fu Kung Marie C Lin Songshan Jiang

MicroRNAs (miRNAs) are small, non-coding RNAs which regulate gene expression at the post-transcriptional level. Abnormal expression of miRNAs occurs frequently in human tumors. Despite the fact that reduced expression of miR-128 has been observed in glioma tissues and cells, the role of miR-128 in tumors has not been fully characterized. In the present study, cell adhesion assays indicated that...

Journal: :IACR Cryptology ePrint Archive 2004
Philip Hawkes Michael Paddon Gregory G. Rose

Mundja is a MAC generation algorithm that has been designed for use together with a stream cipher. Mundja accumulates the message onto two independent registers: the first is a Cyclic Redundancy Checksum (CRC) that uses linear feedback; the second is a strengthened version of the SHA-256 register [5] that uses nonlinear feedback. Mundja is fast (asymptotically about 4 times the speed of HMAC-SH...

2011
Raja Zeshan Haider

128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vulnerable to birthday forgery attack. Birthday forgery attack requires minimum 2 known message-MAC pairs for finding collision in 128-EIA3. 128-EIA3 is susceptible to internal collision of its universal ...

1996
Curtis Abbott Henry Massalin Kevin Peterson Tom Karzes Larry Yamano Gregg Kellogg

An important objective of the MicroUnity mediaprocessor is to allow the design of systems that replace hardwired functionality with software. One of the key design techniques that has been employed at the architectural level is an instruction set that processes 128-bit vectors of data of varying widths. This introduces the challenge of writing software that effectively uses the available vector...

Journal: :IACR Cryptology ePrint Archive 2009
Mohamed Abo El-Fotouh Klaus Diepold

In this paper, we present an enhanced cryptanalysis of the Substitution Cipher Chaining mode (SCC) [1]. In [2], SCC-128 (SCC which uses AES with 128-bit key) was broken using 5 attacks, where the authors used an active attack model (where the attacker can force the disk encryption application to re-encrypt a sector for her), the complexity of these attacks are at most 2 cipher executions. In th...

Journal: :RFC 1996
Keith McCloghrie

Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. The IP, UDP, and TCP MIB modules currentl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید