These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

120 related articles for article (PubMed ID: 30779766)

  • 1. Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016.
    Teruya T
    PLoS One; 2019; 14(2):e0212310. PubMed ID: 30779766
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.
    Wang M; Dai G; Choo KK; Jayaraman PP; Ranjan R
    PLoS One; 2016; 11(8):e0161857. PubMed ID: 27564373
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Fast parallel molecular algorithms for DNA-based computation: solving the elliptic curve discrete logarithm problem over GF2.
    Li K; Zou S; Xv J
    J Biomed Biotechnol; 2008; 2008():518093. PubMed ID: 18431451
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.
    Hossain MS; Saeedi E; Kong Y
    PLoS One; 2017; 12(5):e0176214. PubMed ID: 28459831
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Extending the IEEE 802.15.4 security suite with a compact implementation of the NIST P-192/B-163 elliptic curves.
    de la Piedra A; Braeken A; Touhafi A
    Sensors (Basel); 2013 Jul; 13(8):9704-28. PubMed ID: 23899936
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A secure and efficient certificateless content extraction signature with privacy protection.
    Zhao C; Liu J; Zheng F; Wang D; Meng B
    PLoS One; 2021; 16(11):e0258907. PubMed ID: 34723998
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings.
    Hayat U; Ullah I; Azam NA; Azhar S
    Entropy (Basel); 2022 Apr; 24(5):. PubMed ID: 35626456
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols.
    Yang A; Nam J; Kim M; Choo KK
    ScientificWorldJournal; 2014; 2014():825984. PubMed ID: 25276863
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems.
    Tidrea A; Korodi A; Silea I
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904888
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System.
    Kavitha S; Alphonse PJA; Reddy YV
    J Med Syst; 2019 Jul; 43(8):260. PubMed ID: 31267216
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Quantum Circuit Optimization for Solving Discrete Logarithm of Binary Elliptic Curves Obeying the Nearest-Neighbor Constrained.
    Liu J; Wang H; Ma Z; Duan Q; Fei Y; Meng X
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885178
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
    Farash MS; Nawaz O; Mahmood K; Chaudhry SA; Khan MK
    J Med Syst; 2016 Jul; 40(7):165. PubMed ID: 27221283
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Secure SCADA communication by using a modified key management scheme.
    Rezai A; Keshavarzi P; Moravej Z
    ISA Trans; 2013 Jul; 52(4):517-24. PubMed ID: 23528753
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.
    Shu H; Chen F; Xie D; Sun L; Qi P; Huang Y
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569570
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.
    Mishra D
    J Med Syst; 2015 Mar; 39(3):19. PubMed ID: 25651950
    [TBL] [Abstract][Full Text] [Related]  

  • 17. High rank elliptic curves with torsion ℤ/4ℤ.
    Khoshnam F; Moody D
    Integers; 2016; 17():. PubMed ID: 28769739
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve.
    Islam MM; Hossain MS; Hasan MK; Shahjalal M; Jang YM
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927594
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.
    Wu L; Zhang Y; Li L; Shen J
    J Med Syst; 2016 Jun; 40(6):134. PubMed ID: 27091755
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.
    Chaudhry SA; Mahmood K; Naqvi H; Khan MK
    J Med Syst; 2015 Nov; 39(11):175. PubMed ID: 26399937
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.