搜索结果: 1-15 共查到“知识库 key”相关记录1672条 . 查询时间(0.64 秒)
Nonhomologous end joining as key to CRISPR/Cas-mediated plant chromosome engineering
CRISPR Cas plant chromosome;plant breeding;Arabidopsis thaliana;Genome editing NHEJ
2023/11/30
Although clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated protein (Cas)-mediated gene editing has revolutionized biology and plant breeding, large-scale, heritable ...
γ-Aminobutyric acid plays a key role in plant acclimation to a combination of high light and heat stress
c-Aminobutyric acid high light heat stress Arabidopsis thaliana abiotic stresses metabolic response GABA
2023/11/30
Plants are frequently subjected to different combinations of abiotic stresses, such as high light (HL) intensity, and elevated temperatures. These environmental conditions pose a threat to agriculture...
The key clock component ZEITLUPE (ZTL) negatively regulates ABA signaling by degradation of CHLH in Arabidopsis
ABA circadian clock ZTL CHLH Arabidopsis signal transduction
2023/11/16
Ubiquitination-mediated protein degradation plays important roles in ABA signal transduction and delivering responses to chloroplast stress signals in plants, but additional E3 ligases of protein ubiq...
Identification of candidate genes for key fibre-related QTLs and derivation of favourable alleles in Gossypium hirsutum recombinant inbred lines with G. barbadense introgressions
海岛棉 基因组组分 遗传作图群体
2024/5/17
该研究以渗入了海岛棉基因组组分的优质种质鲁原343为亲本,构建了包含239个重组自交系的遗传作图群体,利用SLAF标签构建了高密度遗传图谱,结合7个环境的表型数据,共鉴定104个纤维品质和产量性状QTLs,其中66个QTL共定位于19个QTL簇中。该研究团队通过进一步对鲁原343进行全基因组深度测序,解析鲁原343的遗传组成及其对纤维相关性状的遗传贡献,发现来自G. hirsutum races(...
Key Residues of the Receptor Binding Motif in the Spike Protein of SARS-CoV-2 That Interact With ACE2 and Neutralizing Antibodies
SARS-CoV-2 cross-neutralizing antibody receptor binding motif spike protein substitution mutation
2020/6/11
Coronavirus disease 2019 (COVID-19), caused by the novel human coronavirus SARS-CoV-2, is currently a major threat to public health worldwide. The viral spike protein binds the host receptor angiotens...
Separating Standard and Asymmetric Password-Authenticated Key Exchange
PAKE Password-Authenticated Key Exchange
2019/9/23
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
A Machine-Checked Proof of Security for AWS Key Management Service
Provable-Security Machine-Checked Proof Key Management
2019/9/19
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
A New Public Key Cryptosystem Based on Edwards Curves
Elliptic curves Twisted Edwards curves RSA cryptosystem
2019/9/19
The elliptic curve cryptography plays a central role in various cryptographic schemes and protocols. For efficiency reasons, Edwards curves and twisted Edwards curves have been introduced. In this pap...
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
Simple and Efficient KDM-CCA Secure Public Key Encryption
key dependent message security chosen ciphertext security
2019/9/16
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
Security Reductions for White-Box Key-Storage in Mobile Payments
White-box cryptography secure key storage hardware-binding
2019/9/16
The goal of white-box cryptography is to provide security even when the cryptographic implementation is executed in adversarially controlled environments. White-box implementations nowadays appear in ...
Bootstrapping Consensus Without Trusted Setup: Fully Asynchronous Distributed Key Generation
threshold cryptography distributed cryptography asynchronous consensus
2019/9/16
In this paper, we present the first fully asynchronous distributed key generation (ADKG) algorithm as well as the first distributed key generation algorithm that can create keys with a dual (f,2f+1)...
In 1998, Jerey Hostein, Jill Pipher, and Joseph H. Silverman introduced the famous Ntru cryptosystem, and called it "A ring-based public key cryptosystem". Actually it turns out to be a lattice based ...