These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

145 related articles for article (PubMed ID: 35774444)

  • 1. Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption's Substitution Box.
    Khan MF; Saleem K; Hazzazi MM; Alotaibi M; Shukla PK; Aqeel M; Tuncer SA
    Comput Intell Neurosci; 2022; 2022():2532497. PubMed ID: 35774444
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.
    Khan MF; Saleem K; Shah T; Hazzazi MM; Bahkali I; Shukla PK
    Comput Intell Neurosci; 2022; 2022():8338508. PubMed ID: 35634082
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map.
    Ali A; Khan MA; Ayyasamy RK; Wasif M
    PeerJ Comput Sci; 2022; 8():e940. PubMed ID: 35634109
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging.
    Khan MF; Saleem K; Alshara MA; Bashir S
    Sci Rep; 2021 Jul; 11(1):14282. PubMed ID: 34253755
    [TBL] [Abstract][Full Text] [Related]  

  • 5. AES Based White Box Cryptography in Digital Signature Verification.
    Shukla PK; Aljaedi A; Pareek PK; Alharbi AR; Jamal SS
    Sensors (Basel); 2022 Dec; 22(23):. PubMed ID: 36502144
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption.
    Elshoush HT; Al-Tayeb BM; Obeid KT
    PeerJ Comput Sci; 2021; 7():e812. PubMed ID: 35036534
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Memristor-based PUF for lightweight cryptographic randomness.
    Ibrahim HM; Abunahla H; Mohammad B; AlKhzaimi H
    Sci Rep; 2022 May; 12(1):8633. PubMed ID: 35606367
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A quantum encryption design featuring confusion, diffusion, and mode of operation.
    Hu Z; Kais S
    Sci Rep; 2021 Dec; 11(1):23774. PubMed ID: 34893658
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.
    Murillo-Escobar MA; Cardoza-Avendaño L; López-Gutiérrez RM; Cruz-Hernández C
    J Med Syst; 2017 Apr; 41(4):59. PubMed ID: 28247306
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Optimization of a Simulated Annealing Algorithm for S-Boxes Generating.
    Kuznetsov A; Wieclaw L; Poluyanenko N; Hamera L; Kandiy S; Lohachova Y
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015833
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Performance comparison between Chaos and quantum-chaos based image encryption techniques.
    Kumari M; Gupta S
    Multimed Tools Appl; 2021; 80(24):33213-33255. PubMed ID: 34413701
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Design of highly nonlinear confusion component based on entangled points of quantum spin states.
    Muhammad Waseem H; Hwang SO
    Sci Rep; 2023 Jan; 13(1):1099. PubMed ID: 36658189
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Novel Image Encryption Technique Based on Mobius Transformation.
    Asif M; Mairaj S; Saeed Z; Ashraf MU; Jambi K; Zulqarnain RM
    Comput Intell Neurosci; 2021; 2021():1912859. PubMed ID: 34956343
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field.
    Siddiqui N; Yousaf F; Murtaza F; Ehatisham-Ul-Haq M; Ashraf MU; Alghamdi AM; Alfakeeh AS
    PLoS One; 2020; 15(11):e0241890. PubMed ID: 33180847
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A secure key dependent dynamic substitution method for symmetric cryptosystems.
    Ejaz A; Shoukat IA; Iqbal U; Rauf A; Kanwal A
    PeerJ Comput Sci; 2021; 7():e587. PubMed ID: 34395857
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Report on the Development of the Advanced Encryption Standard (AES).
    Nechvatal J; Barker E; Bassham L; Burr W; Dworkin M; Foti J; Roback E
    J Res Natl Inst Stand Technol; 2001; 106(3):511-77. PubMed ID: 27500035
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications.
    Yasser I; Mohamed MA; Samra AS; Khalifa F
    Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287021
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cryptographic transistor for true random number generator with low power consumption.
    Kim SI; You HJ; Kim MS; An US; Kim MS; Lee DH; Ryu ST; Choi YK
    Sci Adv; 2024 Feb; 10(8):eadk6042. PubMed ID: 38394200
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Report on Pairing-based Cryptography.
    Moody D; Peralta R; Perlner R; Regenscheid A; Roginsky A; Chen L
    J Res Natl Inst Stand Technol; 2015; 120():11-27. PubMed ID: 26958435
    [TBL] [Abstract][Full Text] [Related]  

  • 20. True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing.
    Lee K; Lee M
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31554242
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.