These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

170 related articles for article (PubMed ID: 32260497)

  • 21. Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm.
    Baldanzi L; Crocetti L; Falaschi F; Bertolucci M; Belli J; Fanucci L; Saponara S
    Sensors (Basel); 2020 Mar; 20(7):. PubMed ID: 32230946
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform.
    Gulen U; Baktir S
    Sensors (Basel); 2020 Mar; 20(5):. PubMed ID: 32182915
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Power Consumption and Calculation Requirement Analysis of AES for WSN IoT.
    Hung CW; Hsu WT
    Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29882865
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.
    Gangadari BR; Rafi Ahamed S
    Healthc Technol Lett; 2016 Sep; 3(3):177-183. PubMed ID: 27733924
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve.
    Islam MM; Hossain MS; Hasan MK; Shahjalal M; Jang YM
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927594
    [TBL] [Abstract][Full Text] [Related]  

  • 26. An Embedded Sensor Node Microcontroller with Crypto-Processors.
    Panić G; Stecklina O; Stamenković Z
    Sensors (Basel); 2016 Apr; 16(5):. PubMed ID: 27128925
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Secure CT-Image Encryption for COVID-19 Infections Using HBBS-Based Multiple Key-Streams.
    Reyad O; Karar ME
    Arab J Sci Eng; 2021; 46(4):3581-3593. PubMed ID: 33425645
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A New Quaternion-Based Encryption Method for DICOM Images.
    Dzwonkowski M; Papaj M; Rykaczewski R
    IEEE Trans Image Process; 2015 Nov; 24(11):4614-22. PubMed ID: 26276993
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Distributed power analysis attack on SM4 encryption chip.
    Gong H; Ju T
    Sci Rep; 2024 Jan; 14(1):1007. PubMed ID: 38200004
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Secure Quaternion Feistel Cipher for DICOM Images.
    Dzwonkowski M; Rykaczewski R
    IEEE Trans Image Process; 2019 Jan; 28(1):371-380. PubMed ID: 30183633
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Fast video encryption using the H.264 error propagation property for smart mobile devices.
    Chung Y; Lee S; Jeon T; Park D
    Sensors (Basel); 2015 Apr; 15(4):7953-68. PubMed ID: 25850068
    [TBL] [Abstract][Full Text] [Related]  

  • 32. FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher.
    Abed S; Jaffal R; Mohd BJ; Alshayeji M
    Sensors (Basel); 2019 Feb; 19(4):. PubMed ID: 30795605
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Secure transmission of urologic images and records over the Internet.
    Kuo RL; Aslan P; Dinlenc CZ; Lee BR; Screnci D; Babayan RK; Kavoussi LR; Preminger GM
    J Endourol; 1999 Apr; 13(3):141-6. PubMed ID: 10360490
    [TBL] [Abstract][Full Text] [Related]  

  • 34. How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption.
    Wang J; Ling C
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441077
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis.
    Fang X; Zhang H; Cui X; Wang Y; Ding L
    Entropy (Basel); 2023 Jun; 25(6):. PubMed ID: 37372252
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Combined Pseudo-Random Sequence Generator for Cybersecurity.
    Maksymovych V; Shabatura M; Harasymchuk O; Shevchuk R; Sawicki P; Zajac T
    Sensors (Basel); 2022 Dec; 22(24):. PubMed ID: 36560068
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited.
    Kim H; Lim S; Kang Y; Kim W; Kim D; Yoon S; Seo H
    Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509933
    [TBL] [Abstract][Full Text] [Related]  

  • 38. On the dynamic reconfigurable implementations of MISTY1 and KASUMI block ciphers.
    Jiexian H; Khizar Y; Ali ZA; Hasan R; Pathan MS
    PLoS One; 2023; 18(9):e0291429. PubMed ID: 37768962
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Design of a BIST implemented AES crypto-processor ASIC.
    Ali ML; Rahman MS; Hossain FS
    PLoS One; 2021; 16(11):e0259956. PubMed ID: 34784393
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Numerically controlled oscillators with hybrid function generators.
    Jainiszewski I; Hoppe B; Meuth H
    IEEE Trans Ultrason Ferroelectr Freq Control; 2002 Jul; 49(7):995-1004. PubMed ID: 12152954
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.