An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt...An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU.展开更多
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa...The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.展开更多
BACKGROUND Although en bloc dissection of hepatic hilum lymph nodes has many advantages in radical tumor treatment,the feasibility and safety of this approach for laparo-scopic pancreaticoduodenectomy(LPD)require furt...BACKGROUND Although en bloc dissection of hepatic hilum lymph nodes has many advantages in radical tumor treatment,the feasibility and safety of this approach for laparo-scopic pancreaticoduodenectomy(LPD)require further clinical evaluation and investigation.AIM To explore the application value of the"five steps four quadrants"modularized en bloc dissection technique for accessing hepatic hilum lymph nodes in LPD patients.METHODS A total of 52 patients who underwent LPD via the"five steps four quadrants"modularized en bloc dissection technique for hepatic hilum lymph nodes from April 2021 to July 2023 in our department were analyzed retrospectively.The patients'body mass index(BMI),preoperative laboratory indices,intraoperative variables and postoperative complications were recorded.The relationships between preoperative data and intraoperative lymph node dissection time and blood loss were also analyzed.RESULTS Among the 52 patients,36 were males and 16 were females,and the average age was 62.2±11.0 years.There were 26 patients with pancreatic head cancer,16 patients with periampullary cancer,and 10 patients with distal bile duct cancer.The BMI was 22.3±3.3 kg/m²,and the median total bilirubin(TBIL)concentration was 57.7(16.0-155.7)µmol/L.All patients successfully underwent the"five steps four quadrants"modularized en bloc dissection technique without lymph node clearance-related complications such as postoperative bleeding or lymphatic leakage.Correlation analysis revealed significant associations between preoperative BMI(r=0.3581,P=0.0091),TBIL level(r=0.2988,P=0.0341),prothrombin time(r=0.3018,P=0.0297)and lymph node dissection time.Moreover,dissection time was significantly correlated with intraoperative blood loss(r=0.7744,P<0.0001).Further stratified analysis demonstrated that patients with a preoperative BMI≥21.9 kg/m²and a TIBL concentration≥57.7μmol/L had significantly longer lymph node dissection times(both P<0.05).CONCLUSION The"five steps four quadrants"modularized en bloc dissection technique for accessing the hepatic hilum lymph node is safe and feasible for LPD.This technique is expected to improve the efficiency of hepatic hilum lymph node dissection and shorten the learning curve;thus,it is worthy of further clinical promotion and application.展开更多
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.展开更多
Photoenzymatic catalysis has become an emerging field in organic synthetic chemistry that provides eco-friendly alternatives to traditional methods. This comprehensive review examines the developing field of photoenzy...Photoenzymatic catalysis has become an emerging field in organic synthetic chemistry that provides eco-friendly alternatives to traditional methods. This comprehensive review examines the developing field of photoenzymatic catalysis, categorized by reaction types and focusing on its application in organic synthesis. This article highlights recent advances in the use of photoenzymatic reactions in carbon-carbon cross-coupling, ketone and alkene reduction, hydroamination, and hydrosulfonylation, mostly by flavin-dependent “ene”-reductases and nitroreductases. In each case, we exemplified the substrate scope that produces products with high yield and enantioselectivity. Additionally, the emerging trends in developing new enzymatic variants and novel reaction pathways that broaden the scope and enhance yield of these reactions were discussed.展开更多
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int...In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.展开更多
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext...B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively.展开更多
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform...This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology.展开更多
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o...In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value.展开更多
文摘An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU.
基金The National Natural Science Foundation of China (No. 60273049, 60303026, 60473020)
文摘The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.
基金Supported by Health Research Program of Anhui,No.AHWJ2022b032。
文摘BACKGROUND Although en bloc dissection of hepatic hilum lymph nodes has many advantages in radical tumor treatment,the feasibility and safety of this approach for laparo-scopic pancreaticoduodenectomy(LPD)require further clinical evaluation and investigation.AIM To explore the application value of the"five steps four quadrants"modularized en bloc dissection technique for accessing hepatic hilum lymph nodes in LPD patients.METHODS A total of 52 patients who underwent LPD via the"five steps four quadrants"modularized en bloc dissection technique for hepatic hilum lymph nodes from April 2021 to July 2023 in our department were analyzed retrospectively.The patients'body mass index(BMI),preoperative laboratory indices,intraoperative variables and postoperative complications were recorded.The relationships between preoperative data and intraoperative lymph node dissection time and blood loss were also analyzed.RESULTS Among the 52 patients,36 were males and 16 were females,and the average age was 62.2±11.0 years.There were 26 patients with pancreatic head cancer,16 patients with periampullary cancer,and 10 patients with distal bile duct cancer.The BMI was 22.3±3.3 kg/m²,and the median total bilirubin(TBIL)concentration was 57.7(16.0-155.7)µmol/L.All patients successfully underwent the"five steps four quadrants"modularized en bloc dissection technique without lymph node clearance-related complications such as postoperative bleeding or lymphatic leakage.Correlation analysis revealed significant associations between preoperative BMI(r=0.3581,P=0.0091),TBIL level(r=0.2988,P=0.0341),prothrombin time(r=0.3018,P=0.0297)and lymph node dissection time.Moreover,dissection time was significantly correlated with intraoperative blood loss(r=0.7744,P<0.0001).Further stratified analysis demonstrated that patients with a preoperative BMI≥21.9 kg/m²and a TIBL concentration≥57.7μmol/L had significantly longer lymph node dissection times(both P<0.05).CONCLUSION The"five steps four quadrants"modularized en bloc dissection technique for accessing the hepatic hilum lymph node is safe and feasible for LPD.This technique is expected to improve the efficiency of hepatic hilum lymph node dissection and shorten the learning curve;thus,it is worthy of further clinical promotion and application.
文摘In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.
文摘Photoenzymatic catalysis has become an emerging field in organic synthetic chemistry that provides eco-friendly alternatives to traditional methods. This comprehensive review examines the developing field of photoenzymatic catalysis, categorized by reaction types and focusing on its application in organic synthesis. This article highlights recent advances in the use of photoenzymatic reactions in carbon-carbon cross-coupling, ketone and alkene reduction, hydroamination, and hydrosulfonylation, mostly by flavin-dependent “ene”-reductases and nitroreductases. In each case, we exemplified the substrate scope that produces products with high yield and enantioselectivity. Additionally, the emerging trends in developing new enzymatic variants and novel reaction pathways that broaden the scope and enhance yield of these reactions were discussed.
文摘In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.
文摘B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively.
文摘This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology.
基金National Natural Science Foundation of China(No.11865013)Horizontal Project of Shangrao Normal University,China(No.K8000219T)+1 种基金Industrial Science and Technology Project in Shangrao of Jiangxi Province,China(No.17A005)Doctoral Scientific Research Foundation of Shangrao Normal University,China(No.6000108)。
文摘In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value.