This is our latest selection of worldwide publications and patents in english on Encryption, between many scientific online journals, classified and focused on encryption, cryptography, cipher, AES, cryptanalysis, Diffie-Hellman, hash function, RSA algorithm, digital signature, cryptographic key, certificate authority, public key, private key and elliptic curve.
The Response of Alpine Permafrost to Decadal Human Disturbance in the Context of Climate Warming
Published on 2025-10-19 by Shuping Zhang, Ji Chen, Lijun Huo, Xinyang Li, Chengying Wu, Hucai Zhang, Qi Feng @MDPI
Abstract: Alpine permafrost plays a vital role in regional hydrology and ecology. Alpine permafrost is highly sensitive to climate change and human disturbance. The Muri area, which is located in the headwaters of the Datong River, northeast of the Tibetan Plateau, has undergone decadal mining, and the permafrost stability there has attracted substantial concerns. In order to decipher how and to what extent the permafrost in the Muri area has responded to the decadal mining in the context of climate chang[...]
Our summary: The study analyzes the response of alpine permafrost in the Muri area to decadal mining and climate change. It utilizes downscaled MODIS land surface temperatures to estimate active layer thickness with high accuracy. Findings indicate that human disturbance has increased active layer thickness without significant spatial expansion.
Permafrost, Climate Change, Human Disturbance, Land Surface Temperature
Publication
A Landsat NDVI Buffer-Gradient Approach for Sustainable Rail Infrastructure
Published on 2025-10-19 by Balgyn Ashimova, Raikhan Beisenova, Ignacio Menéndez-Pidal @MDPI
Abstract: The development of railway infrastructure is considered a key driver of vegetation cover transformation, particularly in ecologically sensitive regions. This study aims to quantify the spatio-temporal impact of the Presnogorkovskaya–Zhanaesil railway corridor in Northern Kazakhstan over the period 1985–2024. Using Landsat imagery and a gradient method of comparative analysis with a control area, an innovative coefficient B was developed to assess changes across variou[...]
Our summary: This study quantifies the impact of the Presnogorkovskaya–Zhanaesil railway on vegetation in Northern Kazakhstan from 1985 to 2024. It employs Landsat imagery and a gradient analysis method to develop a new coefficient for assessing vegetation changes. The findings reveal significant degradation near the railway, influenced by both anthropogenic factors and environmental gradients.
Landsat, NDVI, railway infrastructure, vegetation change
Publication
A Blockchain-Based Medical Insurance Transaction System
Published on 2025-10-17 by Jun Fei, Li Ling @MDPI
Abstract: The Blockchain-Based Medical Insurance Transaction System (BMIT) developed in this study addresses key issues in traditional medical insurance—information silos, data tampering, and privacy breaches—through innovative blockchain architectural design and technical infrastructure reconstruction. Built on a consortium blockchain architecture with FISCO BCOS (Financial Blockchain Shenzhen Consortium Blockchain Open Source Platform) as the underlying platform, the system l[...]
Our summary: The Blockchain-Based Medical Insurance Transaction System (BMIT) utilizes a consortium blockchain architecture to enhance data security and privacy in medical insurance. It features a unique 3D-enhanced Bloom filter for efficient data storage and access control. Performance tests demonstrate its capability to handle 736 TPS with low latency, making it suitable for large-scale applications.
Blockchain, Medical Insurance, Data Privacy, Smart Contracts
Publication
Secure Chaotic Cryptosystem for 3D Medical Images
Published on 2025-10-16 by Antonios S. Andreatos, Apostolos P. Leros @MDPI
Abstract: This study proposes a lightweight double-encryption cryptosystem for 3D medical images such as Magnetic Resonance Imaging (MRI), Positron Emission Tomography (PET) scans, and Computed Tomography scans (CT). The first encryption process uses chaotic pseudo-random numbers produced by a Lorenz chaotic system while the second applies Cipher Block Chaining (CBC) mode using outputs from a Pseudo-Random Number Generator (PRNG). To enhance diffusion and confusion, additional voxel shuffling and bit rota[...]
Our summary: This study presents a lightweight double-encryption cryptosystem for 3D medical images. It utilizes chaotic pseudo-random numbers and Cipher Block Chaining for enhanced security. The cryptosystem demonstrates strong performance metrics, ensuring confidentiality and resilience against threats.
Chaotic Cryptosystem, Double-Encryption, Medical Imaging, Security
Publication
Integrity and data encryption (ide) shared across multiple interconnect controllers
Patent published on the 2025-10-16 in WO under Ref WO2025217333 by RAMBUS INC [US] (Kapoor Ajay [us], Liao Yu Cheng [us], Ternullo Luigi [us])
Abstract: Technologies directed to integrity and data encryption (IDE) shared across multiple interconnect controllers are described. A device includes multiple interconnect controllers and a single IDE circuit coupled with the multiple interconnect controllers. The single IDE circuit includes arbitration logic to enable concurrent support of the multiple interconnect controllers with a reconfigurable bandwidth allocation.[...]
Our summary: The content discusses technologies for integrity and data encryption shared among multiple interconnect controllers. It describes a device featuring multiple interconnect controllers connected to a single IDE circuit. The IDE circuit includes arbitration logic for concurrent support and reconfigurable bandwidth allocation.
Integrity, data encryption, interconnect controllers, arbitration logic
Patent
An AI-Enhanced Blockchain Consensus Framework for Autonomous Regulatory Compliance
Published on 2025-10-15 by Sejin Han @MDPI
Abstract: Following the stablecoin legislation (GENIUS Act) enacted under the second Trump administration in 2025, blockchain has become core digital economy infrastructure. However, privacy risks from decentralization and transparency constrain adoption in regulated industries, requiring solutions that harmonize blockchain architecture with regulatory compliance. Existing research relies on reactive auditing or post-execution rule checking, which wastes computational resources or provides only basic encr[...]
Our summary: The AIRPoC framework enhances blockchain with AI for autonomous regulatory compliance. It features a dual-layer architecture that validates regulations before consensus execution. Experimental results show high compliance accuracy and efficient transaction processing.
AI, Blockchain, Regulatory Compliance, Consensus Framework
Publication
Hybrid Receptor-Mediated Molecular Delineations in TNF-α and IGF-1-Induced Costimulatory Effects
Published on 2025-10-15 by Chandra S. Boosani, Pradeep N. Subramanyam, Gopal P. Jadhav @MDPI
Abstract: The growth-promoting roles of IGF-1 (Insulin-like Growth Factor 1) and the inflammation-modulating cytokine TNF-α (Tumor Necrosis Factor-alpha) have been substantially deciphered in various pathological conditions. Also, their biphasic roles in modulating cellular inflammation have been reported. While their independent signaling pathways are sufficiently explored, recent studies have identified that their combined or costimulatory effects uniquely contribute to the regulation of d[...]
Our summary: This study investigates the costimulatory effects of TNF-alpha and IGF-1 on SOCS3 expression. It reveals that hybrid receptors formed by TNFR1 and IGF1R may inhibit SOCS3 expression. The findings suggest a negative feedback mechanism involving SOCS3 that regulates inflammatory signaling.
Hybrid receptors, TNF-alpha, IGF-1, SOCS3
Publication
A computer hardware encryption device
Patent published on the 2025-10-06 in LU under Ref LU600475 by ZHEJIANG COLLEGE OF SECURITY TECH [CN] (Zhang Li [cn])
Abstract: The invention discloses a computer hardware encryption device, which relates to the technical field of computer security, comprising a chassis, the side of the chassis is hinged and equipped with a box door, and the interior of the chassis is also equipped with a control module and computer hardware; The operation screen is arranged on the side of the box door for entering the unlock password and fingerprint recognition; The camera is set on the side of the box door for face recognition; The ope[...]
Our summary: The invention describes a computer hardware encryption device designed for enhanced security. It features a chassis with a hinged box door, control module, and biometric systems for user authentication. The device effectively isolates and protects computer hardware from unauthorized access and external connections.
encryption, computer security, hardware protection, biometric authentication
Patent








