These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

100 related articles for article (PubMed ID: 25967630)

  • 1. Analytic known-plaintext attack on a phase-shifting interferometry-based cryptosystem.
    Li T; Wang Y; Zhang J; Shi Y
    Appl Opt; 2015 Jan; 54(2):306-11. PubMed ID: 25967630
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry.
    Qin W; Peng X; Meng X; Gao BZ
    Opt Eng; 2011 Jun; 50(6):. PubMed ID: 23894214
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask.
    Xiong Y; He A; Quan C
    Appl Opt; 2018 Jul; 57(21):6010-6016. PubMed ID: 30118027
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform.
    Rajput SK; Nishchal NK
    Appl Opt; 2013 Feb; 52(4):871-8. PubMed ID: 23385931
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Known-plaintext attack on optical encryption based on double random phase keys.
    Peng X; Zhang P; Wei H; Yu B
    Opt Lett; 2006 Apr; 31(8):1044-6. PubMed ID: 16625897
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security analysis on an interference-based optical image encryption scheme.
    Xiong Y; Gu J; Kumar R
    Appl Opt; 2022 Oct; 61(30):9045-9051. PubMed ID: 36607034
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation.
    Zhang C; He W; Wu J; Peng X
    Opt Express; 2015 Apr; 23(7):8845-54. PubMed ID: 25968722
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform.
    Wang Y; Quan C; Tay CJ
    Appl Opt; 2015 Aug; 54(22):6874-81. PubMed ID: 26368104
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Discussion on comparative analysis and a new attack on optical asymmetric cryptosystem.
    Fatima A; Nishchal NK
    J Opt Soc Am A Opt Image Sci Vis; 2016 Oct; 33(10):2034-2040. PubMed ID: 27828107
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Modified plaintext attacks in a session for an optical cryptosystem based on DRPE with PFS.
    Sachin ; Kumar R; Singh P
    Appl Opt; 2022 Jan; 61(2):623-628. PubMed ID: 35200905
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium.
    Liao M; He W; Lu D; Peng X
    Sci Rep; 2017 Jan; 7():41789. PubMed ID: 28139729
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform.
    Wang X; Chen Y; Dai C; Zhao D
    Appl Opt; 2014 Jan; 53(2):208-13. PubMed ID: 24514051
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain.
    Peng X; Wei H; Zhang P
    Opt Lett; 2006 Nov; 31(22):3261-3. PubMed ID: 17072390
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Apr; 58(12):3301-3309. PubMed ID: 31044810
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Security analysis of phase-only DRPE based on known-plaintext attack using multiple known plaintext-ciphertext pairs.
    Nakano K; Takeda M; Suzuki H; Yamaguchi M
    Appl Opt; 2014 Oct; 53(28):6435-43. PubMed ID: 25322230
    [TBL] [Abstract][Full Text] [Related]  

  • 17. New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition.
    Wang Y; Quan C; Tay CJ
    Appl Opt; 2016 Feb; 55(4):679-86. PubMed ID: 26836068
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Ciphertext-only attack on the JTC-based cryptosystem with sizes and locations of the plaintext and the key code unknown.
    Cai J; Shen X; Wu H; Lin C
    Appl Opt; 2015 May; 54(15):4760-4. PubMed ID: 26192512
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cryptosystem for plaintext messages utilizing optical properties of gratings.
    Chen YB; Chen JS
    Appl Opt; 2010 Apr; 49(11):2041-6. PubMed ID: 20390002
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cryptoanalysis and enhancement of a binary image encryption system based on interference.
    Du J; Xiong Y; Quan C
    Appl Opt; 2021 Sep; 60(26):8038-8045. PubMed ID: 34613065
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.