These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

125 related articles for article (PubMed ID: 35546191)

  • 21. Influence of superpositional wave function oscillations on Shor's quantum algorithm.
    Berman GP; Doolen GD; Tsifrinovich VI
    Phys Rev Lett; 2000 Feb; 84(7):1615-8. PubMed ID: 11017581
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Memory attacks on device-independent quantum cryptography.
    Barrett J; Colbeck R; Kent A
    Phys Rev Lett; 2013 Jan; 110(1):010503. PubMed ID: 23383767
    [TBL] [Abstract][Full Text] [Related]  

  • 23. A quantum encryption design featuring confusion, diffusion, and mode of operation.
    Hu Z; Kais S
    Sci Rep; 2021 Dec; 11(1):23774. PubMed ID: 34893658
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Experimental demonstration of a compiled version of Shor's algorithm with quantum entanglement.
    Lanyon BP; Weinhold TJ; Langford NK; Barbieri M; James DF; Gilchrist A; White AG
    Phys Rev Lett; 2007 Dec; 99(25):250505. PubMed ID: 18233509
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Quantum Oblivious Transfer: A Short Review.
    Santos MB; Mateus P; Pinto AN
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885167
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Suggested Integral Analysis for Chaos-Based Image Cryptosystems.
    Murillo-Escobar MA; Meranza-Castillón MO; López-Gutiérrez RM; Cruz-Hernández C
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267528
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Proof-of-principle demonstration of compiled Shor's algorithm using a quantum dot single-photon source.
    Duan ZC; Li JP; Qin J; Yu Y; Huo YH; Höfling S; Lu CY; Liu NL; Chen K; Pan JW
    Opt Express; 2020 Jun; 28(13):18917-18930. PubMed ID: 32672180
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Cyber-physical defense in the quantum Era.
    Barbeau M; Garcia-Alfaro J
    Sci Rep; 2022 Feb; 12(1):1905. PubMed ID: 35115576
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Algorithms for Lightweight Key Exchange.
    Alvarez R; Caballero-Gil C; Santonja J; Zamora A
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28654006
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.
    Coutinho M; de Oliveira Albuquerque R; Borges F; García Villalba LJ; Kim TH
    Sensors (Basel); 2018 Apr; 18(5):. PubMed ID: 29695066
    [TBL] [Abstract][Full Text] [Related]  

  • 31. The future of Cochrane Neonatal.
    Soll RF; Ovelman C; McGuire W
    Early Hum Dev; 2020 Nov; 150():105191. PubMed ID: 33036834
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Differential Phase Shift Quantum Secret Sharing Using a Twin Field with Asymmetric Source Intensities.
    Jia ZY; Gu J; Li BH; Yin HL; Chen ZB
    Entropy (Basel); 2021 Jun; 23(6):. PubMed ID: 34199849
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Quantum Schur Sampling Circuits can be Strongly Simulated.
    Havlíček V; Strelchuk S
    Phys Rev Lett; 2018 Aug; 121(6):060505. PubMed ID: 30141646
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Coherence as a Resource for Shor's Algorithm.
    Ahnefeld F; Theurer T; Egloff D; Matera JM; Plenio MB
    Phys Rev Lett; 2022 Sep; 129(12):120501. PubMed ID: 36179183
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A Rainbow-Based Authentical Scheme for Securing Smart Connected Health Systems.
    Yi H; Li J; Lin Q; Wang H; Song H; Ming Z; Nie Z
    J Med Syst; 2019 Jul; 43(8):276. PubMed ID: 31280402
    [TBL] [Abstract][Full Text] [Related]  

  • 36. DiLizium: A Two-Party Lattice-Based Signature Scheme.
    Vakarjuk J; Snetkov N; Willemson J
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441129
    [TBL] [Abstract][Full Text] [Related]  

  • 37. An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.
    Shi J; Chen S; Lu Y; Feng Y; Shi R; Yang Y; Li J
    Sci Rep; 2020 Feb; 10(1):2107. PubMed ID: 32034194
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack.
    Stewart I; Ilie D; Zamyatin A; Werner S; Torshizi MF; Knottenbelt WJ
    R Soc Open Sci; 2018 Jun; 5(6):180410. PubMed ID: 30110420
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Quantum Attacks on Sum of Even-Mansour Construction with Linear Key Schedules.
    Zhang P
    Entropy (Basel); 2022 Jan; 24(2):. PubMed ID: 35205449
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE.
    Rani R; Kumar S; Kaiwartya O; Khasawneh AM; Lloret J; Al-Khasawneh MA; Mahmoud M; Alarood AA
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33800227
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.