Encryption and decryption of tissue factor

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Leakage resistant encryption and decryption

Introduction Data encryption and decryption operations are basic building blocks for most security applications. For this purpose, most systems use block ciphers, such as the public AES standard. It is well known, however, that implementations of block ciphers such as AES, as well as other cryptographic algorithms, are subject to side-channel attacks [1]. These attacks allow adversaries to extr...

متن کامل

Distributed Encryption and Decryption Algorithms

In this paper, we describe distributed encryption and decryption algorithms. These algorithms are required in order to make a dependable distributed data storage system in which data is stored in an encrypted form resilient to a number of arbitrarily faulty nodes in the system. By execution of these algorithms, a group of n nodes is able to encrypt or decrypt data with any secret cryptographic ...

متن کامل

Tissue factor encryption.

Tissue factor (TF) encryption is the post-translational suppression of TF procoagulant activity (PCA) on the cell surface. There is emerging evidence of encrypted TF in normal blood associated with monocytes and platelets. Expression of this latent TF PCA during the propagation phase of blood coagulation may contribute to hemostasis. One pathway leading to the decryption of TF PCA begins with a...

متن کامل

A New Polybit Shuffling Encryption and Decryption Algorithm Based on N Dimensional Encryption-Decryption Matrix

This paper elaborates polybit shuffling encryption and decryption algorithm based on N Dimensional encryption-decryption matrix which is an attempt to improve over the Classical Playfair Cipher. The unique feature of this algorithm is that it retains the simplicity of Classical Playfair Cipher but increases the robustness against crypto-attack by many folds. Moreover this algorithm can be used ...

متن کامل

Attribute-based encryption with encryption and decryption outsourcing

In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing of computationally expensive encryption and decryption steps. The scheme constitutes an important building block for mobile applications where both the host and users use mobile devices with limited computational power. In the proposed scheme, during encryption the host involves a semi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Thrombosis and Haemostasis

سال: 2013

ISSN: 1538-7933

DOI: 10.1111/jth.12228