These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

126 related articles for article (PubMed ID: 33646959)

  • 1. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Multivariate Cryptography Based on Clipped Hopfield Neural Network.
    Wang J; Cheng LM; Su T
    IEEE Trans Neural Netw Learn Syst; 2018 Feb; 29(2):353-363. PubMed ID: 27893400
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Factoring semi-primes with (quantum) SAT-solvers.
    Mosca M; Verschoor SR
    Sci Rep; 2022 May; 12(1):7982. PubMed ID: 35568707
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance.
    Vandersypen LM; Steffen M; Breyta G; Yannoni CS; Sherwood MH; Chuang IL
    Nature; 2001 Dec 20-27; 414(6866):883-7. PubMed ID: 11780055
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Quantum attack-resistent certificateless multi-receiver signcryption scheme.
    Li H; Chen X; Pang L; Shi W
    PLoS One; 2013; 8(6):e49141. PubMed ID: 23967037
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Prime factorization algorithm based on parameter optimization of Ising model.
    Wang B; Hu F; Yao H; Wang C
    Sci Rep; 2020 Apr; 10(1):7106. PubMed ID: 32345998
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Quantum exhaustive key search with simplified-DES as a case study.
    Almazrooie M; Samsudin A; Abdullah R; Mutter KN
    Springerplus; 2016; 5(1):1494. PubMed ID: 27652067
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme.
    Ahmad M; Al-Solami E
    Entropy (Basel); 2020 Jun; 22(7):. PubMed ID: 33286489
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
    Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure chaotic map based block cryptosystem with application to camera sensor networks.
    Guo X; Zhang J; Khan MK; Alghathbar K
    Sensors (Basel); 2011; 11(2):1607-19. PubMed ID: 22319371
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Post-quantum cryptography.
    Bernstein DJ; Lange T
    Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE.
    Rani R; Kumar S; Kaiwartya O; Khasawneh AM; Lloret J; Al-Khasawneh MA; Mahmoud M; Alarood AA
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33800227
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Differential cryptanalysis of a medical image cryptosystem with multiple rounds.
    Chen L; Wang S
    Comput Biol Med; 2015 Oct; 65():69-75. PubMed ID: 26298487
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.
    Shi J; Chen S; Lu Y; Feng Y; Shi R; Yang Y; Li J
    Sci Rep; 2020 Feb; 10(1):2107. PubMed ID: 32034194
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Algorithms on ensemble quantum computers.
    Boykin PO; Mor T; Roychowdhury V; Vatan F
    Nat Comput; 2010 Jun; 9(2):329-345. PubMed ID: 21475662
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
    Coutinho M; de Oliveira Albuquerque R; Borges F; GarcĂ­a Villalba LJ; Kim TH
    Sensors (Basel); 2018 Apr; 18(5):. PubMed ID: 29695066
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Efficient realization of quantum primitives for Shor's algorithm using PennyLane library.
    Antipov AV; Kiktenko EO; Fedorov AK
    PLoS One; 2022; 17(7):e0271462. PubMed ID: 35834546
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An effective and secure key-management scheme for hierarchical access control in E-medicine system.
    Odelu V; Das AK; Goswami A
    J Med Syst; 2013 Apr; 37(2):9920. PubMed ID: 23392626
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.