These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 36475081)

  • 1. Development of the Advanced Encryption Standard.
    Smid ME
    J Res Natl Inst Stand Technol; 2021; 126():126024. PubMed ID: 36475081
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Report on the Development of the Advanced Encryption Standard (AES).
    Nechvatal J; Barker E; Bassham L; Burr W; Dworkin M; Foti J; Roback E
    J Res Natl Inst Stand Technol; 2001; 106(3):511-77. PubMed ID: 27500035
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Optimization of AES-128 Encryption Algorithm for Security Layer in ZigBee Networking of Internet of Things.
    Luo Z; Shen K; Hu R; Yang Y; Deng R
    Comput Intell Neurosci; 2022; 2022():8424100. PubMed ID: 35498166
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Novel Cipher-Based Data Encryption with Galois Field Theory.
    Hazzazi MM; Attuluri S; Bassfar Z; Joshi K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991997
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Outstanding scientist of the year 2006: Rogel Patawaran, BS.
    Rubin RA; Hazirjian CL
    J Long Term Eff Med Implants; 2006; 16(1):1-7. PubMed ID: 16566740
    [TBL] [Abstract][Full Text] [Related]  

  • 6. AES Based White Box Cryptography in Digital Signature Verification.
    Shukla PK; Aljaedi A; Pareek PK; Alharbi AR; Jamal SS
    Sensors (Basel); 2022 Dec; 22(23):. PubMed ID: 36502144
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Analytical Study of Hybrid Techniques for Image Encryption and Decryption.
    Chowdhary CL; Patel PV; Kathrotia KJ; Attique M; P K; Ijaz MF
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927714
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.
    Gangadari BR; Rafi Ahamed S
    Healthc Technol Lett; 2016 Sep; 3(3):177-183. PubMed ID: 27733924
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Design of a BIST implemented AES crypto-processor ASIC.
    Ali ML; Rahman MS; Hossain FS
    PLoS One; 2021; 16(11):e0259956. PubMed ID: 34784393
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Image Encryption Algorithm Based on Discrete-Time Alternating Quantum Walk and Advanced Encryption Standard.
    Liu G; Li W; Fan X; Li Z; Wang Y; Ma H
    Entropy (Basel); 2022 Apr; 24(5):. PubMed ID: 35626493
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Resource Shared Galois Field Computation for Energy Efficient AES/CRC in IoT Applications.
    Noor SM; John EB
    IEEE Trans Sustain Comput; 2019; 4(4):340-348. PubMed ID: 34307869
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
    Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A joint signal processing and cryptographic approach to multimedia encryption.
    Mao Y; Wu M
    IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Post-Quantum Security: Opportunities and Challenges.
    Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
    Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH
    J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Power Consumption and Calculation Requirement Analysis of AES for WSN IoT.
    Hung CW; Hsu WT
    Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29882865
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Suggested Integral Analysis for Chaos-Based Image Cryptosystems.
    Murillo-Escobar MA; Meranza-Castillón MO; López-Gutiérrez RM; Cruz-Hernández C
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267528
    [TBL] [Abstract][Full Text] [Related]  

  • 19. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Low Power S-Box Architecture for AES Algorithm using Programmable Second Order Reversible Cellular Automata: An Application to WBAN.
    Gangadari BR; Ahamed SR
    J Med Syst; 2016 Dec; 40(12):257. PubMed ID: 27722977
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.