These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

194 related articles for article (PubMed ID: 37420546)

  • 1. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture.
    Lee J; Kim W; Kim JH
    Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067782
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Post-Quantum Security: Opportunities and Challenges.
    Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 6. In-line rate encrypted links using pre-shared post-quantum keys and DPUs.
    Cano Aguilera A; Rubio Garcia C; Lawo D; Imaña JL; Tafur Monroy I; Vegas Olmos JJ
    Sci Rep; 2024 Sep; 14(1):21227. PubMed ID: 39261510
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.
    Costa VLRD; López J; Ribeiro MV
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
    Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH
    J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
    Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A novel image encryption scheme based on quantum dynamical spinning and rotations.
    Khan M; Waseem HM
    PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schöffel M; Lauer F; Rheinländer CC; Wehn N
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health.
    Mittal S; Bansal A; Gupta D; Juneja S; Turabieh H; Elarabawy MM; Sharma A; Bitsue ZK
    Comput Intell Neurosci; 2022; 2022():7016554. PubMed ID: 35510050
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity.
    Redhu R; Narwal E; Gupta S; Hooda R; Ahlawat S; Khurana R
    Sci Rep; 2024 May; 14(1):9994. PubMed ID: 38693269
    [TBL] [Abstract][Full Text] [Related]  

  • 15. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.
    Kalsi S; Kaur H; Chang V
    J Med Syst; 2017 Dec; 42(1):17. PubMed ID: 29204890
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Report on the Development of the Advanced Encryption Standard (AES).
    Nechvatal J; Barker E; Bassham L; Burr W; Dworkin M; Foti J; Roback E
    J Res Natl Inst Stand Technol; 2001; 106(3):511-77. PubMed ID: 27500035
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Post-quantum cryptography.
    Bernstein DJ; Lange T
    Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Efficient realization of quantum primitives for Shor's algorithm using PennyLane library.
    Antipov AV; Kiktenko EO; Fedorov AK
    PLoS One; 2022; 17(7):e0271462. PubMed ID: 35834546
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Post-quantum distributed ledger technology: a systematic survey.
    Parida NK; Jatoth C; Reddy VD; Hussain MM; Faizi J
    Sci Rep; 2023 Nov; 13(1):20729. PubMed ID: 38007570
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications.
    Norouzzadeh Gil Molk AM; Aref MR; Ramazani Khorshiddoust R
    Comput Intell Neurosci; 2021; 2021():3583275. PubMed ID: 34545280
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.