These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

126 related articles for article (PubMed ID: 37095966)

  • 1. On the resistance of new lightweight block ciphers against differential cryptanalysis.
    Chan YY; Khor CY; Khoo BT; Teh JS; Teng WJ; Jamil N
    Heliyon; 2023 Apr; 9(4):e15257. PubMed ID: 37095966
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited.
    Kim H; Lim S; Kang Y; Kim W; Kim D; Yoon S; Seo H
    Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509933
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers.
    Rana M; Mamun Q; Islam R
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37765734
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction.
    Wang J; Ding Q
    Entropy (Basel); 2018 Sep; 20(9):. PubMed ID: 33265782
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA.
    Potestad-Ordóñez FE; Valencia-Barrero M; Baena-Oliva C; Parra-Fernández P; Jiménez-Fernández CJ
    Sensors (Basel); 2020 Dec; 20(23):. PubMed ID: 33287234
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments.
    Amin Ghafari V; Hu H
    Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265271
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cube attacks on round-reduced TinyJAMBU.
    Teng WL; Salam I; Yau WC; Pieprzyk J; Phan RC
    Sci Rep; 2022 Mar; 12(1):5317. PubMed ID: 35351928
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis.
    Dworak K; Boryczka U
    Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946003
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher.
    Rizk-Allah RM; Abdulkader H; Elatif SSA; Elkilani WS; Al Maghayreh E; Dhahri H; Mahmood A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632252
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A practical key recovery attack on the lightweight WG-5 stream cipher.
    Ding L; Liao Z; Li Z; Wu Z; Wang X; Guan Z
    Heliyon; 2024 Jan; 10(2):e24197. PubMed ID: 38268835
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices.
    Lara E; Aguilar L; García JA; Sanchez MA
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30287774
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum Neural Network Based Distinguisher on SPECK-32/64.
    Kim H; Jang K; Lim S; Kang Y; Kim W; Seo H
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420849
    [TBL] [Abstract][Full Text] [Related]  

  • 13. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.
    Khan MF; Saleem K; Shah T; Hazzazi MM; Bahkali I; Shukla PK
    Comput Intell Neurosci; 2022; 2022():8338508. PubMed ID: 35634082
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis.
    Azimi SA; Ranea A; Salmasizadeh M; Mohajeri J; Aref MR; Rijmen V
    Des Codes Cryptogr; 2022; 90(8):1797-1855. PubMed ID: 35813599
    [TBL] [Abstract][Full Text] [Related]  

  • 16. On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers.
    Tito-Corrioso O; Borges-Quintana M; Borges-Trenard MA; Rojas O; Sosa-Gómez G
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832626
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Chaos-Based Lightweight Cryptographic Algorithm Design and FPGA Implementation.
    Guang Y; Yu L; Dong W; Wang Y; Zeng J; Zhao J; Ding Q
    Entropy (Basel); 2022 Nov; 24(11):. PubMed ID: 36359700
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Improved 2-round collision attack on IoT hash standard ASCON-HASH.
    Zhai D; Bai W; Fu J; Gao H; Zhu X
    Heliyon; 2024 Mar; 10(5):e26119. PubMed ID: 38434343
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Optimization of a Simulated Annealing Algorithm for S-Boxes Generating.
    Kuznetsov A; Wieclaw L; Poluyanenko N; Hamera L; Kandiy S; Lohachova Y
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015833
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Differential cryptanalysis of a medical image cryptosystem with multiple rounds.
    Chen L; Wang S
    Comput Biol Med; 2015 Oct; 65():69-75. PubMed ID: 26298487
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.