These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
126 related articles for article (PubMed ID: 18188317)
1. Optical implementation of the stream cipher based on the irreversible cellular automata algorithm. Madjarova M; Kakuta M; Yamaguchi M; Ohyama N Opt Lett; 1997 Nov; 22(21):1624-6. PubMed ID: 18188317 [TBL] [Abstract][Full Text] [Related]
2. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments. Amin Ghafari V; Hu H Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265271 [TBL] [Abstract][Full Text] [Related]
3. Stream cipher based on pseudorandom number generation with optical affine transformation. Sasaki T; Togo H; Tanida J; Ichioka Y Appl Opt; 2000 May; 39(14):2340-6. PubMed ID: 18345143 [TBL] [Abstract][Full Text] [Related]
4. Optical stream-cipher-like system for image encryption based on Michelson interferometer. Yang B; Liu Z; Wang B; Zhang Y; Liu S Opt Express; 2011 Jan; 19(3):2634-42. PubMed ID: 21369084 [TBL] [Abstract][Full Text] [Related]
7. Digital optical computing with magneto-optic spatial light modulators: a new and efficient multiplication algorithm. Wu YD; Shen DS; Bykovsky VK; Rosetti J; Fiddy MA Appl Opt; 1994 Nov; 33(32):7572-8. PubMed ID: 20962962 [TBL] [Abstract][Full Text] [Related]
8. Design for an optical random access memory. Murdocca MJ; Sugla B Appl Opt; 1989 Jan; 28(1):182-8. PubMed ID: 20548447 [TBL] [Abstract][Full Text] [Related]
9. Anamorphic optical transformation of an amplitude spatial light modulator to a complex spatial light modulator with square pixels [invited]. Kim H; Hwang CY; Kim KS; Roh J; Moon W; Kim S; Lee BR; Oh S; Hahn J Appl Opt; 2014 Sep; 53(27):G139-46. PubMed ID: 25322122 [TBL] [Abstract][Full Text] [Related]
10. Learning and recall algorithm for optical associative memory using a bistable spatial light modulator. Toyoda H; Ishikawa M Appl Opt; 1995 Jun; 34(17):3145-51. PubMed ID: 21052470 [TBL] [Abstract][Full Text] [Related]
11. Identification of probabilistic cellular automata. Billings SA; Yang Y IEEE Trans Syst Man Cybern B Cybern; 2003; 33(2):225-36. PubMed ID: 18238173 [TBL] [Abstract][Full Text] [Related]
12. Efficient hardware implementation of the lightweight block encryption algorithm LEA. Lee D; Kim DC; Kwon D; Kim H Sensors (Basel); 2014 Jan; 14(1):975-94. PubMed ID: 24406859 [TBL] [Abstract][Full Text] [Related]
13. All binary number-conserving cellular automata based on adjacent cells are intrinsically one-dimensional. Wolnik B; De Baets B Phys Rev E; 2019 Aug; 100(2-1):022126. PubMed ID: 31574760 [TBL] [Abstract][Full Text] [Related]
14. Application of a MEMS-Based TRNG in a Chaotic Stream Cipher. Garcia-Bosque M; Pérez A; Sánchez-Azqueta C; Celma S Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28335579 [TBL] [Abstract][Full Text] [Related]
15. Secure Quaternion Feistel Cipher for DICOM Images. Dzwonkowski M; Rykaczewski R IEEE Trans Image Process; 2019 Jan; 28(1):371-380. PubMed ID: 30183633 [TBL] [Abstract][Full Text] [Related]
16. An accelerated threshold-based back-projection algorithm for compton camera image reconstruction. Mundy DW; Herman MG Med Phys; 2011 Jan; 38(1):15-22. PubMed ID: 21361170 [TBL] [Abstract][Full Text] [Related]