These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

152 related articles for article (PubMed ID: 36236316)

  • 1. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.
    Costa VLRD; López J; Ribeiro MV
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture.
    Lee J; Kim W; Kim JH
    Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067782
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems.
    Sánchez-Solano S; Camacho-Ruiz E; Martínez-Rodríguez MC; Brox P
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271204
    [TBL] [Abstract][Full Text] [Related]  

  • 5. In-line rate encrypted links using pre-shared post-quantum keys and DPUs.
    Cano Aguilera A; Rubio Garcia C; Lawo D; Imaña JL; Tafur Monroy I; Vegas Olmos JJ
    Sci Rep; 2024 Sep; 14(1):21227. PubMed ID: 39261510
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schöffel M; Lauer F; Rheinländer CC; Wehn N
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Password authenticated key exchange-based on Kyber for mobile devices.
    Seyhan K; Akleylek S; Dursun AF
    PeerJ Comput Sci; 2024; 10():e1960. PubMed ID: 38660167
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum attack-resistent certificateless multi-receiver signcryption scheme.
    Li H; Chen X; Pang L; Shi W
    PLoS One; 2013; 8(6):e49141. PubMed ID: 23967037
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Rainbow-Based Authentical Scheme for Securing Smart Connected Health Systems.
    Yi H; Li J; Lin Q; Wang H; Song H; Ming Z; Nie Z
    J Med Syst; 2019 Jul; 43(8):276. PubMed ID: 31280402
    [TBL] [Abstract][Full Text] [Related]  

  • 12. DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V.
    Chen Y; Chen H; Chen S; Han C; Ye W; Liu Y; Zhou H
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015746
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An efficient heterogeneous signcryption for smart grid.
    Jin C; Chen G; Yu C; Shan J; Zhao J; Jin Y
    PLoS One; 2018; 13(12):e0208311. PubMed ID: 30562351
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity.
    Redhu R; Narwal E; Gupta S; Hooda R; Ahlawat S; Khurana R
    Sci Rep; 2024 May; 14(1):9994. PubMed ID: 38693269
    [TBL] [Abstract][Full Text] [Related]  

  • 15. All optical metropolitan quantum key distribution network with post-quantum cryptography authentication.
    Yang YH; Li PY; Ma SZ; Qian XC; Zhang KY; Wang LJ; Zhang WL; Zhou F; Tang SB; Wang JY; Yu Y; Zhang Q; Pan JW
    Opt Express; 2021 Aug; 29(16):25859-25867. PubMed ID: 34614905
    [TBL] [Abstract][Full Text] [Related]  

  • 16. High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems.
    Zhang Z; Wang X; Hao Q; Xu D; Zhang J; Liu J; Ma J
    Micromachines (Basel); 2021 May; 12(5):. PubMed ID: 34063441
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Identity-Based Proxy Signature with Message Recovery over NTRU Lattice.
    Wu F; Zhou B; Zhang X
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981342
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Post-quantum cryptography.
    Bernstein DJ; Lange T
    Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891
    [TBL] [Abstract][Full Text] [Related]  

  • 19. DiLizium: A Two-Party Lattice-Based Signature Scheme.
    Vakarjuk J; Snetkov N; Willemson J
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441129
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Lightweight System-On-Chip Based Cryptographic Core for Low-Cost Devices.
    Gookyi DAN; Ryoo K
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458989
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.