These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 36015833)

  • 21. Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations.
    Razaq A; Alhamzi G; Abbas S; Ahmad M; Razzaque A
    Heliyon; 2023 May; 9(5):e15902. PubMed ID: 37215757
    [TBL] [Abstract][Full Text] [Related]  

  • 22. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption's Substitution Box.
    Khan MF; Saleem K; Hazzazi MM; Alotaibi M; Shukla PK; Aqeel M; Tuncer SA
    Comput Intell Neurosci; 2022; 2022():2532497. PubMed ID: 35774444
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis.
    Azimi SA; Ranea A; Salmasizadeh M; Mohajeri J; Aref MR; Rijmen V
    Des Codes Cryptogr; 2022; 90(8):1797-1855. PubMed ID: 35813599
    [TBL] [Abstract][Full Text] [Related]  

  • 25. A medical image encryption scheme based on Mobius transformation and Galois field.
    Ali J; Jamil MK; Alali AS; Ali R; Gulraiz
    Heliyon; 2024 Jan; 10(1):e23652. PubMed ID: 38192806
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A Symmetric Plaintext-Related Color Image Encryption System Based on Bit Permutation.
    Cai S; Huang L; Chen X; Xiong X
    Entropy (Basel); 2018 Apr; 20(4):. PubMed ID: 33265373
    [TBL] [Abstract][Full Text] [Related]  

  • 27. A secure key dependent dynamic substitution method for symmetric cryptosystems.
    Ejaz A; Shoukat IA; Iqbal U; Rauf A; Kanwal A
    PeerJ Comput Sci; 2021; 7():e587. PubMed ID: 34395857
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Quantum exhaustive key search with simplified-DES as a case study.
    Almazrooie M; Samsudin A; Abdullah R; Mutter KN
    Springerplus; 2016; 5(1):1494. PubMed ID: 27652067
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.
    Chandrasekaran J; Thiruvengadam SJ
    ScientificWorldJournal; 2015; 2015():458272. PubMed ID: 26550603
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction.
    Wang J; Ding Q
    Entropy (Basel); 2018 Sep; 20(9):. PubMed ID: 33265782
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Design of highly nonlinear confusion component based on entangled points of quantum spin states.
    Muhammad Waseem H; Hwang SO
    Sci Rep; 2023 Jan; 13(1):1099. PubMed ID: 36658189
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A novel algorithm for thermal image encryption.
    Hussain I; Anees A; Algarni A
    J Integr Neurosci; 2018; 17(3-4):447-461. PubMed ID: 29689732
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Security enhanced optical encryption system by random phase key and permutation key.
    He M; Tan Q; Cao L; He Q; Jin G
    Opt Express; 2009 Dec; 17(25):22462-73. PubMed ID: 20052170
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A Novel Virtual Optical Image Encryption Scheme Created by Combining Chaotic S-Box with Double Random Phase Encoding.
    Tian P; Su R
    Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35891004
    [TBL] [Abstract][Full Text] [Related]  

  • 35. On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers.
    Tito-Corrioso O; Borges-Quintana M; Borges-Trenard MA; Rojas O; Sosa-Gómez G
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832626
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Hybrid encryption technique: Integrating the neural network with distortion techniques.
    Abu Zitar R; Al-Muhammed MJ
    PLoS One; 2022; 17(9):e0274947. PubMed ID: 36170335
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm.
    Wu Z; Pan P; Sun C; Zhao B
    Entropy (Basel); 2021 Sep; 23(9):. PubMed ID: 34573784
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Application of a MEMS-Based TRNG in a Chaotic Stream Cipher.
    Garcia-Bosque M; Pérez A; Sánchez-Azqueta C; Celma S
    Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28335579
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm.
    Baldanzi L; Crocetti L; Falaschi F; Bertolucci M; Belli J; Fanucci L; Saponara S
    Sensors (Basel); 2020 Mar; 20(7):. PubMed ID: 32230946
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Reference energy extremal optimization: a stochastic search algorithm applied to computational protein design.
    Zhang N; Zeng C
    J Comput Chem; 2008 Aug; 29(11):1762-71. PubMed ID: 18351599
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.