These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

151 related articles for article (PubMed ID: 27500035)

  • 1. Report on the Development of the Advanced Encryption Standard (AES).
    Nechvatal J; Barker E; Bassham L; Burr W; Dworkin M; Foti J; Roback E
    J Res Natl Inst Stand Technol; 2001; 106(3):511-77. PubMed ID: 27500035
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Development of the Advanced Encryption Standard.
    Smid ME
    J Res Natl Inst Stand Technol; 2021; 126():126024. PubMed ID: 36475081
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Report on Pairing-based Cryptography.
    Moody D; Peralta R; Perlner R; Regenscheid A; Roginsky A; Chen L
    J Res Natl Inst Stand Technol; 2015; 120():11-27. PubMed ID: 26958435
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Optimization of AES-128 Encryption Algorithm for Security Layer in ZigBee Networking of Internet of Things.
    Luo Z; Shen K; Hu R; Yang Y; Deng R
    Comput Intell Neurosci; 2022; 2022():8424100. PubMed ID: 35498166
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Analytical Study of Hybrid Techniques for Image Encryption and Decryption.
    Chowdhary CL; Patel PV; Kathrotia KJ; Attique M; P K; Ijaz MF
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927714
    [TBL] [Abstract][Full Text] [Related]  

  • 7. AES Based White Box Cryptography in Digital Signature Verification.
    Shukla PK; Aljaedi A; Pareek PK; Alharbi AR; Jamal SS
    Sensors (Basel); 2022 Dec; 22(23):. PubMed ID: 36502144
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Novel Cipher-Based Data Encryption with Galois Field Theory.
    Hazzazi MM; Attuluri S; Bassfar Z; Joshi K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991997
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Design of a BIST implemented AES crypto-processor ASIC.
    Ali ML; Rahman MS; Hossain FS
    PLoS One; 2021; 16(11):e0259956. PubMed ID: 34784393
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Selective Encryption Algorithm Based on AES for Medical Information.
    Oh JY; Yang DI; Chon KH
    Healthc Inform Res; 2010 Mar; 16(1):22-9. PubMed ID: 21818420
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Suggested Integral Analysis for Chaos-Based Image Cryptosystems.
    Murillo-Escobar MA; Meranza-Castillón MO; López-Gutiérrez RM; Cruz-Hernández C
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267528
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cube attacks on round-reduced TinyJAMBU.
    Teng WL; Salam I; Yau WC; Pieprzyk J; Phan RC
    Sci Rep; 2022 Mar; 12(1):5317. PubMed ID: 35351928
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.
    Gangadari BR; Rafi Ahamed S
    Healthc Technol Lett; 2016 Sep; 3(3):177-183. PubMed ID: 27733924
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology.
    Melosik M; Galan M; Naumowicz M; Tylczyński P; Koziol S
    Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509923
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Image Encryption Algorithm Based on Discrete-Time Alternating Quantum Walk and Advanced Encryption Standard.
    Liu G; Li W; Fan X; Li Z; Wang Y; Ma H
    Entropy (Basel); 2022 Apr; 24(5):. PubMed ID: 35626493
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Power Consumption and Calculation Requirement Analysis of AES for WSN IoT.
    Hung CW; Hsu WT
    Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29882865
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Physical Layer Cryptographic Key Generation by Exploiting PMD of an Optical Fiber Link.
    Zaman IU; Lopez AB; Al Faruque MA; Boyraz O
    J Lightwave Technol; 2018 Dec; 36(24):5903-5911. PubMed ID: 30713365
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security.
    Mihaljević MJ
    Entropy (Basel); 2019 Jul; 21(7):. PubMed ID: 33267415
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Building Open Access to Research (OAR) Data Infrastructure at NIST.
    Greene G; Plante R; Hanisch R
    Data Sci J; 2019; 18():. PubMed ID: 31579260
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map.
    Ali A; Khan MA; Ayyasamy RK; Wasif M
    PeerJ Comput Sci; 2022; 8():e940. PubMed ID: 35634109
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.