These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 32863386)

  • 1. NEW MISSION AND OPPORTUNITY FOR MATHEMATICS RESEARCHERS: CRYPTOGRAPHY IN THE QUANTUM ERA.
    Chen L; Moody D
    Adv Math (N Y); 2020; 14(1):. PubMed ID: 32863386
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Post-quantum cryptography.
    Bernstein DJ; Lange T
    Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.
    Costa VLRD; López J; Ribeiro MV
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316
    [TBL] [Abstract][Full Text] [Related]  

  • 5. An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy.
    Shamshad S; Riaz F; Riaz R; Rizvi SS; Abdulla S
    Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365848
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schöffel M; Lauer F; Rheinländer CC; Wehn N
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Report on Pairing-based Cryptography.
    Moody D; Peralta R; Perlner R; Regenscheid A; Roginsky A; Chen L
    J Res Natl Inst Stand Technol; 2015; 120():11-27. PubMed ID: 26958435
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum cryptography beyond quantum key distribution.
    Broadbent A; Schaffner C
    Des Codes Cryptogr; 2016; 78(1):351-382. PubMed ID: 32226229
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum Stream Cipher Based on Holevo-Yuen Theory.
    Sohma M; Hirota O
    Entropy (Basel); 2022 May; 24(5):. PubMed ID: 35626552
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption's Substitution Box.
    Khan MF; Saleem K; Hazzazi MM; Alotaibi M; Shukla PK; Aqeel M; Tuncer SA
    Comput Intell Neurosci; 2022; 2022():2532497. PubMed ID: 35774444
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Quantum Oblivious Transfer: A Short Review.
    Santos MB; Mateus P; Pinto AN
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885167
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
    Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Quantum discord as a resource for quantum cryptography.
    Pirandola S
    Sci Rep; 2014 Nov; 4():6956. PubMed ID: 25378231
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Measurement-Device-Independent Two-Party Cryptography with Error Estimation.
    Zhou Z; Guang Q; Gao C; Jiang D; Chen L
    Sensors (Basel); 2020 Nov; 20(21):. PubMed ID: 33171748
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Novel Cipher-Based Data Encryption with Galois Field Theory.
    Hazzazi MM; Attuluri S; Bassfar Z; Joshi K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991997
    [TBL] [Abstract][Full Text] [Related]  

  • 20. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.
    Kalsi S; Kaur H; Chang V
    J Med Syst; 2017 Dec; 42(1):17. PubMed ID: 29204890
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.