These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 27730020)

  • 1. A highly nonlinear S-box based on a fractional linear transformation.
    Farwa S; Shah T; Idrees L
    Springerplus; 2016; 5(1):1658. PubMed ID: 27730020
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A medical image encryption scheme based on Mobius transformation and Galois field.
    Ali J; Jamil MK; Alali AS; Ali R; Gulraiz
    Heliyon; 2024 Jan; 10(1):e23652. PubMed ID: 38192806
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field.
    Siddiqui N; Yousaf F; Murtaza F; Ehatisham-Ul-Haq M; Ashraf MU; Alghamdi AM; Alfakeeh AS
    PLoS One; 2020; 15(11):e0241890. PubMed ID: 33180847
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map.
    Ali A; Khan MA; Ayyasamy RK; Wasif M
    PeerJ Comput Sci; 2022; 8():e940. PubMed ID: 35634109
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation.
    Zahid AH; Arshad MJ; Ahmad M
    Entropy (Basel); 2019 Mar; 21(3):. PubMed ID: 33266962
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A strong construction of S-box using Mandelbrot set an image encryption scheme.
    Aslam M; Beg S; Anjum A; Qadir Z; Khan S; Malik SUR; Mahmud MP
    PeerJ Comput Sci; 2022; 8():e892. PubMed ID: 36262157
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme.
    Ahmad M; Al-Solami E
    Entropy (Basel); 2020 Jun; 22(7):. PubMed ID: 33286489
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Novel Image Encryption Technique Based on Mobius Transformation.
    Asif M; Mairaj S; Saeed Z; Ashraf MU; Jambi K; Zulqarnain RM
    Comput Intell Neurosci; 2021; 2021():1912859. PubMed ID: 34956343
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A study of text-theoretical approach to S-box construction with image encryption applications.
    Mahboob A; Nadeem M; Rasheed MW
    Sci Rep; 2023 Nov; 13(1):21081. PubMed ID: 38030677
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A novel encryption scheme for high-contrast image data in the Fresnelet domain.
    Bibi N; Farwa S; Muhammad N; Jahngir A; Usman M
    PLoS One; 2018; 13(4):e0194343. PubMed ID: 29608609
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging.
    Khan MF; Saleem K; Alshara MA; Bashir S
    Sci Rep; 2021 Jul; 11(1):14282. PubMed ID: 34253755
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.
    Gangadari BR; Rafi Ahamed S
    Healthc Technol Lett; 2016 Sep; 3(3):177-183. PubMed ID: 27733924
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.
    Chandrasekaran J; Thiruvengadam SJ
    ScientificWorldJournal; 2015; 2015():458272. PubMed ID: 26550603
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Design of highly nonlinear confusion component based on entangled points of quantum spin states.
    Muhammad Waseem H; Hwang SO
    Sci Rep; 2023 Jan; 13(1):1099. PubMed ID: 36658189
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Low Power S-Box Architecture for AES Algorithm using Programmable Second Order Reversible Cellular Automata: An Application to WBAN.
    Gangadari BR; Ahamed SR
    J Med Syst; 2016 Dec; 40(12):257. PubMed ID: 27722977
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion.
    Wen H; Lin Y; Kang S; Zhang X; Zou K
    iScience; 2024 Jan; 27(1):108610. PubMed ID: 38205238
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators.
    Zhang T; Chen CLP; Chen L; Xu X; Hu B
    IEEE Trans Cybern; 2018 Dec; 48(12):3349-3358. PubMed ID: 30040668
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Small Low-Depth Circuits for Cryptographic Applications.
    Boyar J; Find MG; Peralta R
    Cryptogr Commun; 2019; 11():. PubMed ID: 30996763
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Novel Virtual Optical Image Encryption Scheme Created by Combining Chaotic S-Box with Double Random Phase Encoding.
    Tian P; Su R
    Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35891004
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Modeling and simulation of a Tamil language encoder for advanced encryption technologies.
    Suthaharan S
    Patterns (N Y); 2023 Jul; 4(7):100740. PubMed ID: 37521041
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.