These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 37095966)

  • 1. On the resistance of new lightweight block ciphers against differential cryptanalysis.
    Chan YY; Khor CY; Khoo BT; Teh JS; Teng WJ; Jamil N
    Heliyon; 2023 Apr; 9(4):e15257. PubMed ID: 37095966
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction.
    Wang J; Ding Q
    Entropy (Basel); 2018 Sep; 20(9):. PubMed ID: 33265782
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA.
    Potestad-Ordóñez FE; Valencia-Barrero M; Baena-Oliva C; Parra-Fernández P; Jiménez-Fernández CJ
    Sensors (Basel); 2020 Dec; 20(23):. PubMed ID: 33287234
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments.
    Amin Ghafari V; Hu H
    Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265271
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cube attacks on round-reduced TinyJAMBU.
    Teng WL; Salam I; Yau WC; Pieprzyk J; Phan RC
    Sci Rep; 2022 Mar; 12(1):5317. PubMed ID: 35351928
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis.
    Dworak K; Boryczka U
    Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946003
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher.
    Rizk-Allah RM; Abdulkader H; Elatif SSA; Elkilani WS; Al Maghayreh E; Dhahri H; Mahmood A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632252
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices.
    Lara E; Aguilar L; García JA; Sanchez MA
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30287774
    [TBL] [Abstract][Full Text] [Related]  

  • 9. BRISK: Dynamic Encryption Based Cipher for Long Term Security.
    Dwivedi AD
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502635
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.
    Khan MF; Saleem K; Shah T; Hazzazi MM; Bahkali I; Shukla PK
    Comput Intell Neurosci; 2022; 2022():8338508. PubMed ID: 35634082
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis.
    Azimi SA; Ranea A; Salmasizadeh M; Mohajeri J; Aref MR; Rijmen V
    Des Codes Cryptogr; 2022; 90(8):1797-1855. PubMed ID: 35813599
    [TBL] [Abstract][Full Text] [Related]  

  • 12. On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers.
    Tito-Corrioso O; Borges-Quintana M; Borges-Trenard MA; Rojas O; Sosa-Gómez G
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832626
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Chaos-Based Lightweight Cryptographic Algorithm Design and FPGA Implementation.
    Guang Y; Yu L; Dong W; Wang Y; Zeng J; Zhao J; Ding Q
    Entropy (Basel); 2022 Nov; 24(11):. PubMed ID: 36359700
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Optimization of a Simulated Annealing Algorithm for S-Boxes Generating.
    Kuznetsov A; Wieclaw L; Poluyanenko N; Hamera L; Kandiy S; Lohachova Y
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015833
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Differential cryptanalysis of a medical image cryptosystem with multiple rounds.
    Chen L; Wang S
    Comput Biol Med; 2015 Oct; 65():69-75. PubMed ID: 26298487
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A lightweight security framework for electronic healthcare system.
    Chaudhary RRK; Chatterjee K
    Int J Inf Technol; 2022; 14(6):3109-3121. PubMed ID: 35912035
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map.
    Shi G; Yu S; Wang Q
    Entropy (Basel); 2022 Jul; 24(8):. PubMed ID: 35893003
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure Quaternion Feistel Cipher for DICOM Images.
    Dzwonkowski M; Rykaczewski R
    IEEE Trans Image Process; 2019 Jan; 28(1):371-380. PubMed ID: 30183633
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map.
    Ali A; Khan MA; Ayyasamy RK; Wasif M
    PeerJ Comput Sci; 2022; 8():e940. PubMed ID: 35634109
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition.
    Fang X; Zhang H; Wang D; Yan H; Fan F; Shu L
    Entropy (Basel); 2022 Oct; 24(11):. PubMed ID: 36359601
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.