Showing 20 articles starting at article 541
< Previous 20 articles Next 20 articles >
Categories: Biology: Developmental, Computer Science: Encryption
Published An Old Yellow Enzyme helps algae combat photooxidative stress


Old Yellow Enzymes (OYEs) were discovered in the 1930s and have been the subject of much research ever since. This is because these biocatalysts -- coloured yellow by an auxiliary molecule -- are capable of performing reactions that are very valuable for the chemical industry, such as producing drug precursors or fragrances. Even though OYEs are found in many organisms, their natural role for these organisms has hardly been understood so far -- possibly because the research focus has been on their biotechnological application. Researchers have now shown that an OYE of the unicellular green alga Chlamydomonas reinhardtii is vital for this plant microorganism to protect itself from photooxidative stress.
Published New study decodes one of the living world's fastest cell movements



Heliozoan axopodia are important for their motility. However, the underlying mechanism of their axopodial contraction has remained ambiguous. Recently, researchers have reported that microtubules are simultaneously cleaved at multiple sites, allowing the radiating axopodia in a heliozoan, Raphidocystis contractilis, to disappear almost instantly. They have now identified the gene set and proteins involved in this microtubule disruption. This research can help develop a method to detect water pollution and evaluate the efficacy of new anticancer drugs.
Published Modified CRISPR-based enzymes improve the prospect of inserting entire genes into the genome to overcome diverse disease-causing mutations



Many genetic diseases are caused by diverse mutations spread across an entire gene, and designing genome editing approaches for each patient's mutation would be impractical and costly.
Published Researchers propose methods for automatic detection of doxing


A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.
Published Microlaser chip adds new dimensions to quantum communication


With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.
Published New AI model can help prevent damaging and costly data breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.
Published New method to systematically find optimal quantum operation sequences for quantum computers developed


Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.
Published From bits to p-bits: One step closer to probabilistic computing


Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.
Published Thinking like a cyber-attacker to protect user data


Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.
Published A key role for quantum entanglement


A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.
Published Quantum cryptography: Hacking is futile


An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.
Published 'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz


Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.
Published Radio waves for the detection of hardware tampering


Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.
Published Secure communication with light particles


While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.
Published Emulating impossible 'unipolar' laser pulses paves the way for processing quantum information


A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum computing.
Published Self-propelled, endlessly programmable artificial cilia


Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of applications, including soft robotics, biocompatible medical devices, and even dynamic information encryption.
Published Scientific advance leads to a new tool in the fight against hackers


A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows for a person's geographical location to be used as a personal ID that is secure against even the most advanced cyber attacks.
Published New technique offers faster security for non-volatile memory tech


Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security technologies.
Published Technology has the potential to change the patient-provider relationship


As personal health records (AKA patient portals) allowing patients to see test results, medications and other health information gain in popularity, scientists studied cancer patients' and doctors' differing perceptions of this tool. Patients cited potential for personal health records to deepen their relationship with their healthcare provider and to allow them to be more understood. Physicians were interested in having more clinical information sharing to facilitate better patient care.
Published Single-photon source paves the way for practical quantum encryption


Researchers describe new high-purity single-photon source that can operate at room temperature. The source is an important step toward practical applications of quantum technology, such as highly secure communication based on quantum key distribution (QKD).