These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

147 related articles for article (PubMed ID: 35351928)

  • 1. Cube attacks on round-reduced TinyJAMBU.
    Teng WL; Salam I; Yau WC; Pieprzyk J; Phan RC
    Sci Rep; 2022 Mar; 12(1):5317. PubMed ID: 35351928
    [TBL] [Abstract][Full Text] [Related]  

  • 2. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 3. On the resistance of new lightweight block ciphers against differential cryptanalysis.
    Chan YY; Khor CY; Khoo BT; Teh JS; Teng WJ; Jamil N
    Heliyon; 2023 Apr; 9(4):e15257. PubMed ID: 37095966
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices.
    Lara E; Aguilar L; García JA; Sanchez MA
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30287774
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.
    AlMajed H; AlMogren A
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33138018
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Weak-keys and key-recovery attack for [Formula: see text].
    Dutta P; Rajasree MS; Sarkar S
    Sci Rep; 2022 Sep; 12(1):16313. PubMed ID: 36175451
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A practical key recovery attack on the lightweight WG-5 stream cipher.
    Ding L; Liao Z; Li Z; Wu Z; Wang X; Guan Z
    Heliyon; 2024 Jan; 10(2):e24197. PubMed ID: 38268835
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Secure IoT-Based Irrigation System for Precision Agriculture Using the Expeditious Cipher.
    Fathy C; Ali HM
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850688
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Chaos-Based Lightweight Cryptographic Algorithm Design and FPGA Implementation.
    Guang Y; Yu L; Dong W; Wang Y; Zeng J; Zhao J; Ding Q
    Entropy (Basel); 2022 Nov; 24(11):. PubMed ID: 36359700
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction.
    Wang J; Ding Q
    Entropy (Basel); 2018 Sep; 20(9):. PubMed ID: 33265782
    [TBL] [Abstract][Full Text] [Related]  

  • 11. PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices.
    Saraiva DAF; Leithardt VRQ; de Paula D; Sales Mendes A; González GV; Crocker P
    Sensors (Basel); 2019 Oct; 19(19):. PubMed ID: 31590354
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA.
    Potestad-Ordóñez FE; Valencia-Barrero M; Baena-Oliva C; Parra-Fernández P; Jiménez-Fernández CJ
    Sensors (Basel); 2020 Dec; 20(23):. PubMed ID: 33287234
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments.
    Amin Ghafari V; Hu H
    Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265271
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments.
    Lee DH; Yim K; Lee IY
    Sensors (Basel); 2020 Jul; 20(14):. PubMed ID: 32709025
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A new distinguishing attack on reduced round ChaCha permutation.
    Dey C; Sarkar S
    Sci Rep; 2023 Aug; 13(1):13958. PubMed ID: 37633980
    [TBL] [Abstract][Full Text] [Related]  

  • 17. MEAS: memory encryption and authentication secure against side-channel attacks.
    Unterluggauer T; Werner M; Mangard S
    J Cryptogr Eng; 2019; 9(2):137-158. PubMed ID: 31231603
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure lightweight cryptosystem for IoT and pervasive computing.
    Abutaha M; Atawneh B; Hammouri L; Kaddoum G
    Sci Rep; 2022 Nov; 12(1):19649. PubMed ID: 36385267
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
    Mansoor K; Ghani A; Chaudhry SA; Shamshirband S; Ghayyur SAK; Mosavi A
    Sensors (Basel); 2019 Nov; 19(21):. PubMed ID: 31683885
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos.
    Zhu S; Zhu C
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922307
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.