These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

192 related articles for article (PubMed ID: 28905891)

  • 1. Post-quantum cryptography.
    Bernstein DJ; Lange T
    Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
    Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schöffel M; Lauer F; Rheinländer CC; Wehn N
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Fast and simple high-capacity quantum cryptography with error detection.
    Lai H; Luo MX; Pieprzyk J; Zhang J; Pan L; Li S; Orgun MA
    Sci Rep; 2017 Apr; 7():46302. PubMed ID: 28406240
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
    Grosshans F; Cerf NJ
    Phys Rev Lett; 2004 Jan; 92(4):047905. PubMed ID: 14995411
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A novel image encryption scheme based on quantum dynamical spinning and rotations.
    Khan M; Waseem HM
    PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Measurement-device-independent quantum communication without encryption.
    Niu PH; Zhou ZR; Lin ZS; Sheng YB; Yin LG; Long GL
    Sci Bull (Beijing); 2018 Oct; 63(20):1345-1350. PubMed ID: 36658905
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.
    Costa VLRD; López J; Ribeiro MV
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum cryptography beyond quantum key distribution.
    Broadbent A; Schaffner C
    Des Codes Cryptogr; 2016; 78(1):351-382. PubMed ID: 32226229
    [TBL] [Abstract][Full Text] [Related]  

  • 13. NEW MISSION AND OPPORTUNITY FOR MATHEMATICS RESEARCHERS: CRYPTOGRAPHY IN THE QUANTUM ERA.
    Chen L; Moody D
    Adv Math (N Y); 2020; 14(1):. PubMed ID: 32863386
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Post-quantum distributed ledger technology: a systematic survey.
    Parida NK; Jatoth C; Reddy VD; Hussain MM; Faizi J
    Sci Rep; 2023 Nov; 13(1):20729. PubMed ID: 38007570
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
    Marin L; Pawlowski MP; Jara A
    Sensors (Basel); 2015 Aug; 15(9):21478-99. PubMed ID: 26343677
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
    Bruss D; Christandl M; Ekert A; Englert BG; Kaszlikowski D; Macchiavello C
    Phys Rev Lett; 2003 Aug; 91(9):097901. PubMed ID: 14525209
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Post-Quantum Security: Opportunities and Challenges.
    Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Practical device-independent quantum cryptography via entropy accumulation.
    Arnon-Friedman R; Dupuis F; Fawzi O; Renner R; Vidick T
    Nat Commun; 2018 Jan; 9(1):459. PubMed ID: 29386507
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Multivariate Cryptography Based on Clipped Hopfield Neural Network.
    Wang J; Cheng LM; Su T
    IEEE Trans Neural Netw Learn Syst; 2018 Feb; 29(2):353-363. PubMed ID: 27893400
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
    Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH
    J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.