These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. BRISK: Dynamic Encryption Based Cipher for Long Term Security. Dwivedi AD Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635 [TBL] [Abstract][Full Text] [Related]
3. On the resistance of new lightweight block ciphers against differential cryptanalysis. Chan YY; Khor CY; Khoo BT; Teh JS; Teng WJ; Jamil N Heliyon; 2023 Apr; 9(4):e15257. PubMed ID: 37095966 [TBL] [Abstract][Full Text] [Related]
4. A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices. Lara E; Aguilar L; García JA; Sanchez MA Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30287774 [TBL] [Abstract][Full Text] [Related]
5. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things. AlMajed H; AlMogren A Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33138018 [TBL] [Abstract][Full Text] [Related]
6. Weak-keys and key-recovery attack for [Formula: see text]. Dutta P; Rajasree MS; Sarkar S Sci Rep; 2022 Sep; 12(1):16313. PubMed ID: 36175451 [TBL] [Abstract][Full Text] [Related]
7. A practical key recovery attack on the lightweight WG-5 stream cipher. Ding L; Liao Z; Li Z; Wu Z; Wang X; Guan Z Heliyon; 2024 Jan; 10(2):e24197. PubMed ID: 38268835 [TBL] [Abstract][Full Text] [Related]
8. A Secure IoT-Based Irrigation System for Precision Agriculture Using the Expeditious Cipher. Fathy C; Ali HM Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850688 [TBL] [Abstract][Full Text] [Related]
10. Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction. Wang J; Ding Q Entropy (Basel); 2018 Sep; 20(9):. PubMed ID: 33265782 [TBL] [Abstract][Full Text] [Related]
11. PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices. Saraiva DAF; Leithardt VRQ; de Paula D; Sales Mendes A; González GV; Crocker P Sensors (Basel); 2019 Oct; 19(19):. PubMed ID: 31590354 [TBL] [Abstract][Full Text] [Related]
12. Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. Potestad-Ordóñez FE; Valencia-Barrero M; Baena-Oliva C; Parra-Fernández P; Jiménez-Fernández CJ Sensors (Basel); 2020 Dec; 20(23):. PubMed ID: 33287234 [TBL] [Abstract][Full Text] [Related]
13. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments. Amin Ghafari V; Hu H Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265271 [TBL] [Abstract][Full Text] [Related]
14. A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments. Lee DH; Yim K; Lee IY Sensors (Basel); 2020 Jul; 20(14):. PubMed ID: 32709025 [TBL] [Abstract][Full Text] [Related]
15. Quantum Misuse Attack on Frodo. Wang Y; Jiang H; Ma Z Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438 [TBL] [Abstract][Full Text] [Related]
16. A new distinguishing attack on reduced round ChaCha permutation. Dey C; Sarkar S Sci Rep; 2023 Aug; 13(1):13958. PubMed ID: 37633980 [TBL] [Abstract][Full Text] [Related]
17. MEAS: memory encryption and authentication secure against side-channel attacks. Unterluggauer T; Werner M; Mangard S J Cryptogr Eng; 2019; 9(2):137-158. PubMed ID: 31231603 [TBL] [Abstract][Full Text] [Related]
18. Secure lightweight cryptosystem for IoT and pervasive computing. Abutaha M; Atawneh B; Hammouri L; Kaddoum G Sci Rep; 2022 Nov; 12(1):19649. PubMed ID: 36385267 [TBL] [Abstract][Full Text] [Related]
19. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Mansoor K; Ghani A; Chaudhry SA; Shamshirband S; Ghayyur SAK; Mosavi A Sensors (Basel); 2019 Nov; 19(21):. PubMed ID: 31683885 [TBL] [Abstract][Full Text] [Related]
20. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos. Zhu S; Zhu C Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922307 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]