These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

155 related articles for article (PubMed ID: 33287234)

  • 1. Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA.
    Potestad-Ordóñez FE; Valencia-Barrero M; Baena-Oliva C; Parra-Fernández P; Jiménez-Fernández CJ
    Sensors (Basel); 2020 Dec; 20(23):. PubMed ID: 33287234
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations.
    Potestad-Ordóñez FE; Tena-Sánchez E; Mora-Gutiérrez JM; Valencia-Barrero M; Jiménez-Fernández CJ
    Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833675
    [TBL] [Abstract][Full Text] [Related]  

  • 3. On the resistance of new lightweight block ciphers against differential cryptanalysis.
    Chan YY; Khor CY; Khoo BT; Teh JS; Teng WJ; Jamil N
    Heliyon; 2023 Apr; 9(4):e15257. PubMed ID: 37095966
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A practical key recovery attack on the lightweight WG-5 stream cipher.
    Ding L; Liao Z; Li Z; Wu Z; Wang X; Guan Z
    Heliyon; 2024 Jan; 10(2):e24197. PubMed ID: 38268835
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices.
    Lara E; Aguilar L; García JA; Sanchez MA
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30287774
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments.
    Amin Ghafari V; Hu H
    Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265271
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study.
    Abu-Tair M; Djahel S; Perry P; Scotney B; Zia U; Carracedo JM; Sajjad A
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33126629
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices.
    Zhang X; Liu B; Zhao Y; Hu X; Shen Z; Zheng Z; Liu Z; Chong KS; Yu G; Wang C; Zou X
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501862
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cube attacks on round-reduced TinyJAMBU.
    Teng WL; Salam I; Yau WC; Pieprzyk J; Phan RC
    Sci Rep; 2022 Mar; 12(1):5317. PubMed ID: 35351928
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher.
    Rizk-Allah RM; Abdulkader H; Elatif SSA; Elkilani WS; Al Maghayreh E; Dhahri H; Mahmood A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632252
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Chaos-Based Lightweight Cryptographic Algorithm Design and FPGA Implementation.
    Guang Y; Yu L; Dong W; Wang Y; Zeng J; Zhao J; Ding Q
    Entropy (Basel); 2022 Nov; 24(11):. PubMed ID: 36359700
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum exhaustive key search with simplified-DES as a case study.
    Almazrooie M; Samsudin A; Abdullah R; Mutter KN
    Springerplus; 2016; 5(1):1494. PubMed ID: 27652067
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Application of a MEMS-Based TRNG in a Chaotic Stream Cipher.
    Garcia-Bosque M; Pérez A; Sánchez-Azqueta C; Celma S
    Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28335579
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Enhancing Sensor Network Security with Improved Internal Hardware Design.
    Wang W; Deng Z; Wang J
    Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31013741
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis.
    Fang X; Zhang H; Cui X; Wang Y; Ding L
    Entropy (Basel); 2023 Jun; 25(6):. PubMed ID: 37372252
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Key derivation function: key-hash based computational extractor and stream based pseudorandom expander.
    Chuah CW; Harun NZ; Hamid IRA
    PeerJ Comput Sci; 2024; 10():e2249. PubMed ID: 39314715
    [TBL] [Abstract][Full Text] [Related]  

  • 17. FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher.
    Abed S; Jaffal R; Mohd BJ; Alshayeji M
    Sensors (Basel); 2019 Feb; 19(4):. PubMed ID: 30795605
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults.
    Dong L; Zhang H; Sun S; Zhu L; Cui X; Ghosh BK
    Sensors (Basel); 2020 Apr; 20(7):. PubMed ID: 32244774
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices.
    Suárez-Albela M; Fraga-Lamas P; Castedo L; Fernández-Caramés TM
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577524
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Protecting Physical Layer Secret Key Generation from Active Attacks.
    Mitev M; Chorti A; Belmega EV; Poor HV
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441100
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.