These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 37420438)

  • 1. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 3. The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings.
    Ortiz JN; de Araujo RR; Aranha DF; Costa SIR; Dahab R
    Entropy (Basel); 2021 Aug; 23(9):. PubMed ID: 34573733
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation.
    Chang Y; Yan Y; Zhu C; Guo P
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420509
    [TBL] [Abstract][Full Text] [Related]  

  • 5. New Constructions of Identity-Based Dual Receiver Encryption from Lattices.
    Liu Y; Wang L; Shen X; Li L
    Entropy (Basel); 2020 May; 22(6):. PubMed ID: 33286371
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Novel efficient lattice-based IBE schemes with CPK for fog computing.
    Shi Y; Qiu S; Liu J; Ma T
    Math Biosci Eng; 2020 Nov; 17(6):8105-8122. PubMed ID: 33378935
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Suggested Integral Analysis for Chaos-Based Image Cryptosystems.
    Murillo-Escobar MA; Meranza-Castillón MO; López-Gutiérrez RM; Cruz-Hernández C
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267528
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.
    Costa VLRD; López J; Ribeiro MV
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Apr; 58(12):3301-3309. PubMed ID: 31044810
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.
    AlMajed H; AlMogren A
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33138018
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.
    Huang L; Cai S; Xiao M; Xiong X
    Entropy (Basel); 2018 Jul; 20(7):. PubMed ID: 33265624
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos.
    Zhu S; Zhu C
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922307
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A reduction from an LWE problem to maximum independent set problems.
    Kawano Y
    Sci Rep; 2023 May; 13(1):7130. PubMed ID: 37130886
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Quantum exhaustive key search with simplified-DES as a case study.
    Almazrooie M; Samsudin A; Abdullah R; Mutter KN
    Springerplus; 2016; 5(1):1494. PubMed ID: 27652067
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask.
    Xiong Y; He A; Quan C
    Appl Opt; 2018 Jul; 57(21):6010-6016. PubMed ID: 30118027
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry.
    Qin W; Peng X; Meng X; Gao BZ
    Opt Eng; 2011 Jun; 50(6):. PubMed ID: 23894214
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cube attacks on round-reduced TinyJAMBU.
    Teng WL; Salam I; Yau WC; Pieprzyk J; Phan RC
    Sci Rep; 2022 Mar; 12(1):5317. PubMed ID: 35351928
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
    Xiong Y; He A; Quan C
    Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.