These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

122 related articles for article (PubMed ID: 36015833)

  • 1. Optimization of a Simulated Annealing Algorithm for S-Boxes Generating.
    Kuznetsov A; Wieclaw L; Poluyanenko N; Hamera L; Kandiy S; Lohachova Y
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015833
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map.
    Ali A; Khan MA; Ayyasamy RK; Wasif M
    PeerJ Comput Sci; 2022; 8():e940. PubMed ID: 35634109
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.
    Khan MF; Saleem K; Shah T; Hazzazi MM; Bahkali I; Shukla PK
    Comput Intell Neurosci; 2022; 2022():8338508. PubMed ID: 35634082
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Novel Image Encryption Technique Based on Mobius Transformation.
    Asif M; Mairaj S; Saeed Z; Ashraf MU; Jambi K; Zulqarnain RM
    Comput Intell Neurosci; 2021; 2021():1912859. PubMed ID: 34956343
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation.
    Zahid AH; Arshad MJ; Ahmad M
    Entropy (Basel); 2019 Mar; 21(3):. PubMed ID: 33266962
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging.
    Khan MF; Saleem K; Alshara MA; Bashir S
    Sci Rep; 2021 Jul; 11(1):14282. PubMed ID: 34253755
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher.
    Rizk-Allah RM; Abdulkader H; Elatif SSA; Elkilani WS; Al Maghayreh E; Dhahri H; Mahmood A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632252
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited.
    Kim H; Lim S; Kang Y; Kim W; Kim D; Yoon S; Seo H
    Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509933
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes.
    Al Solami E; Ahmad M; Volos C; Doja MN; Beg MMS
    Entropy (Basel); 2018 Jul; 20(7):. PubMed ID: 33265614
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme.
    Ahmad M; Al-Solami E
    Entropy (Basel); 2020 Jun; 22(7):. PubMed ID: 33286489
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field.
    Siddiqui N; Yousaf F; Murtaza F; Ehatisham-Ul-Haq M; Ashraf MU; Alghamdi AM; Alfakeeh AS
    PLoS One; 2020; 15(11):e0241890. PubMed ID: 33180847
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A New Cost Function for Evolution of S-Boxes.
    Picek S; Cupic M; Rotim L
    Evol Comput; 2016; 24(4):695-718. PubMed ID: 27482748
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Chaos-Based Lightweight Cryptographic Algorithm Design and FPGA Implementation.
    Guang Y; Yu L; Dong W; Wang Y; Zeng J; Zhao J; Ding Q
    Entropy (Basel); 2022 Nov; 24(11):. PubMed ID: 36359700
    [TBL] [Abstract][Full Text] [Related]  

  • 14. On the resistance of new lightweight block ciphers against differential cryptanalysis.
    Chan YY; Khor CY; Khoo BT; Teh JS; Teng WJ; Jamil N
    Heliyon; 2023 Apr; 9(4):e15257. PubMed ID: 37095966
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators.
    Zhang T; Chen CLP; Chen L; Xu X; Hu B
    IEEE Trans Cybern; 2018 Dec; 48(12):3349-3358. PubMed ID: 30040668
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis.
    Dworak K; Boryczka U
    Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946003
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A study of text-theoretical approach to S-box construction with image encryption applications.
    Mahboob A; Nadeem M; Rasheed MW
    Sci Rep; 2023 Nov; 13(1):21081. PubMed ID: 38030677
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.
    Gangadari BR; Rafi Ahamed S
    Healthc Technol Lett; 2016 Sep; 3(3):177-183. PubMed ID: 27733924
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition.
    Fang X; Zhang H; Wang D; Yan H; Fan F; Shu L
    Entropy (Basel); 2022 Oct; 24(11):. PubMed ID: 36359601
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos.
    Zhu S; Zhu C
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922307
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.