Showing 20 articles starting at article 801
< Previous 20 articles Next 20 articles >
Categories: Biology: Molecular, Computer Science: Encryption
Published Ancient proteins offer new clues about origin of life on Earth



By simulating early Earth conditions in the lab, researchers have found that without specific amino acids, ancient proteins would not have known how to evolve into everything alive on the planet today -- including plants, animals, and humans.
Published Cells avoid multitasking


Textbooks will tell you that in dividing cells, production of new DNA peaks during the S-phase, while production of other macromolecules, such as proteins, lipids, and polysaccharides, continues at more or less the same level. Molecular biologists have now discovered that this is not true: protein synthesis shows two peaks and lipid synthesis peaks once.
Published Successful cure of HIV infection after stem cell transplantation, study suggests


Haematopoietic stem cell transplantation for the treatment of severe blood cancers is the only medical intervention that has cured two people living with HIV in the past. An international group of physicians and researchers has now identified another case in which HIV infection has been shown to be cured in the same way. The successful healing process of this third patient was for the first time characterized in great detail virologically and immunologically over a time span of ten years.
Published The achilles heel of the influenza virus: Ubiquitin protein may be an approach for future medicines



Influenza viruses are becoming increasingly resilient to medicines. For this reason, new active ingredients are needed. Important findings in this regard have been provided: for the virus to proliferate, the polymerase of the influenza A virus has to be modified many times through enzymes in the host cells. The team of researchers was able to produce a comprehensive map of types of modification. Medicines directed against the enzymes woud be resilient to rapid mutations in the virus, thus offering great potential for the future.
Published Making engineered cells dance to ultrasound


A team has developed a method for selectively manipulating genetically engineered cells with ultrasound.
Published Psyllium fiber protects against colitis by activating bile acid sensor, biomedical sciences researchers find



Psyllium fiber protects against ulcerative colitis and suppresses inflammation by activating the bile acid nuclear receptor, a mechanism that was previously unrecognized, according to a new study.
Published Single gene causes sea anemone's stinging cell to lose its sting


When scientists disabled a single regulatory gene in a species of sea anemone, a stinging cell that shoots a venomous miniature harpoon for hunting and self-defense shifted to shoot a sticky thread that entangles prey instead, according to a new study.
Published Chromo-encryption method encodes secrets with color


In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages.
Published Quantum physicists make major nanoscopic advance



In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this colossal breakthrough allows researchers to create a phenomenon known as quantum mechanical entanglement. This in turn, opens new doors for companies and others to exploit the technology commercially.
Published Researchers propose methods for automatic detection of doxing


A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.
Published Microlaser chip adds new dimensions to quantum communication


With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.
Published New AI model can help prevent damaging and costly data breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.
Published New method to systematically find optimal quantum operation sequences for quantum computers developed


Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.
Published From bits to p-bits: One step closer to probabilistic computing


Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.
Published Thinking like a cyber-attacker to protect user data


Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.
Published A key role for quantum entanglement


A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.
Published Quantum cryptography: Hacking is futile


An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.
Published 'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz


Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.
Published Radio waves for the detection of hardware tampering


Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.
Published Secure communication with light particles


While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.