These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

136 related articles for article (PubMed ID: 35546191)

  • 1. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture.
    Lee J; Kim W; Kim JH
    Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067782
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
    Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450
    [TBL] [Abstract][Full Text] [Related]  

  • 5. All optical metropolitan quantum key distribution network with post-quantum cryptography authentication.
    Yang YH; Li PY; Ma SZ; Qian XC; Zhang KY; Wang LJ; Zhang WL; Zhou F; Tang SB; Wang JY; Yu Y; Zhang Q; Pan JW
    Opt Express; 2021 Aug; 29(16):25859-25867. PubMed ID: 34614905
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Post-quantum cryptography.
    Bernstein DJ; Lange T
    Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.
    Costa VLRD; López J; Ribeiro MV
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Factoring semi-primes with (quantum) SAT-solvers.
    Mosca M; Verschoor SR
    Sci Rep; 2022 May; 12(1):7982. PubMed ID: 35568707
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Post-Quantum Security: Opportunities and Challenges.
    Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schöffel M; Lauer F; Rheinländer CC; Wehn N
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Post-quantum distributed ledger technology: a systematic survey.
    Parida NK; Jatoth C; Reddy VD; Hussain MM; Faizi J
    Sci Rep; 2023 Nov; 13(1):20729. PubMed ID: 38007570
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance.
    Vandersypen LM; Steffen M; Breyta G; Yannoni CS; Sherwood MH; Chuang IL
    Nature; 2001 Dec 20-27; 414(6866):883-7. PubMed ID: 11780055
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A novel image encryption scheme based on quantum dynamical spinning and rotations.
    Khan M; Waseem HM
    PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Resource analysis and modifications of quantum computing with noisy qubits for elliptic curve discrete logarithms.
    Ha J; Lee J; Heo J
    Sci Rep; 2024 Feb; 14(1):3927. PubMed ID: 38366063
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Linking QKD Testbeds across Europe.
    Brauer M; Vicente RJ; Buruaga JS; Méndez RB; Braun RP; Geitz M; Rydlichkowski P; Brunner HH; Fung F; Peev M; Pastor A; Lopez DR; Martin V; Brito JP
    Entropy (Basel); 2024 Jan; 26(2):. PubMed ID: 38392378
    [TBL] [Abstract][Full Text] [Related]  

  • 18. NEW MISSION AND OPPORTUNITY FOR MATHEMATICS RESEARCHERS: CRYPTOGRAPHY IN THE QUANTUM ERA.
    Chen L; Moody D
    Adv Math (N Y); 2020; 14(1):. PubMed ID: 32863386
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Fast and simple high-capacity quantum cryptography with error detection.
    Lai H; Luo MX; Pieprzyk J; Zhang J; Pan L; Li S; Orgun MA
    Sci Rep; 2017 Apr; 7():46302. PubMed ID: 28406240
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
    Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH
    J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.