These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. Transitioning organizations to post-quantum cryptography. Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191 [TBL] [Abstract][Full Text] [Related]
3. A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. Lee J; Kim W; Kim JH Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067782 [TBL] [Abstract][Full Text] [Related]
4. Post-Quantum Security: Opportunities and Challenges. Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442 [TBL] [Abstract][Full Text] [Related]
5. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network. Dai S IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959 [TBL] [Abstract][Full Text] [Related]
7. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications. Costa VLRD; López J; Ribeiro MV Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316 [TBL] [Abstract][Full Text] [Related]
8. Meeting the security requirements of electronic medical records in the ERA of high-speed computing. Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568 [TBL] [Abstract][Full Text] [Related]
9. Quantum Misuse Attack on Frodo. Wang Y; Jiang H; Ma Z Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438 [TBL] [Abstract][Full Text] [Related]
10. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450 [TBL] [Abstract][Full Text] [Related]
11. A novel image encryption scheme based on quantum dynamical spinning and rotations. Khan M; Waseem HM PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455 [TBL] [Abstract][Full Text] [Related]
12. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks? Schöffel M; Lauer F; Rheinländer CC; Wehn N Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099 [TBL] [Abstract][Full Text] [Related]
13. Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. Mittal S; Bansal A; Gupta D; Juneja S; Turabieh H; Elarabawy MM; Sharma A; Bitsue ZK Comput Intell Neurosci; 2022; 2022():7016554. PubMed ID: 35510050 [TBL] [Abstract][Full Text] [Related]
14. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity. Redhu R; Narwal E; Gupta S; Hooda R; Ahlawat S; Khurana R Sci Rep; 2024 May; 14(1):9994. PubMed ID: 38693269 [TBL] [Abstract][Full Text] [Related]
15. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Kalsi S; Kaur H; Chang V J Med Syst; 2017 Dec; 42(1):17. PubMed ID: 29204890 [TBL] [Abstract][Full Text] [Related]
16. Report on the Development of the Advanced Encryption Standard (AES). Nechvatal J; Barker E; Bassham L; Burr W; Dworkin M; Foti J; Roback E J Res Natl Inst Stand Technol; 2001; 106(3):511-77. PubMed ID: 27500035 [TBL] [Abstract][Full Text] [Related]
17. Post-quantum cryptography. Bernstein DJ; Lange T Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891 [TBL] [Abstract][Full Text] [Related]
18. Efficient realization of quantum primitives for Shor's algorithm using PennyLane library. Antipov AV; Kiktenko EO; Fedorov AK PLoS One; 2022; 17(7):e0271462. PubMed ID: 35834546 [TBL] [Abstract][Full Text] [Related]