These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 39261510)

  • 1. In-line rate encrypted links using pre-shared post-quantum keys and DPUs.
    Cano Aguilera A; Rubio Garcia C; Lawo D; Imaña JL; Tafur Monroy I; Vegas Olmos JJ
    Sci Rep; 2024 Sep; 14(1):21227. PubMed ID: 39261510
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
    Farooq S; Altaf A; Iqbal F; Thompson EB; Vargas DLR; Díez IT; Ashraf I
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420546
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Transitioning organizations to post-quantum cryptography.
    Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R
    Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.
    Costa VLRD; López J; Ribeiro MV
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture.
    Lee J; Kim W; Kim JH
    Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067782
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Quantum Misuse Attack on Frodo.
    Wang Y; Jiang H; Ma Z
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438
    [TBL] [Abstract][Full Text] [Related]  

  • 7. All optical metropolitan quantum key distribution network with post-quantum cryptography authentication.
    Yang YH; Li PY; Ma SZ; Qian XC; Zhang KY; Wang LJ; Zhang WL; Zhou F; Tang SB; Wang JY; Yu Y; Zhang Q; Pan JW
    Opt Express; 2021 Aug; 29(16):25859-25867. PubMed ID: 34614905
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
    Septien-Hernandez JA; Arellano-Vazquez M; Contreras-Cruz MA; Ramirez-Paredes JP
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062450
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams.
    Green A; Lawrence J; Siopsis G; Peters NA; Passian A
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139664
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded.
    Vergoossen T; Bedington R; Grieve JA; Ling A
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267101
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Post-Quantum Security: Opportunities and Challenges.
    Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schöffel M; Lauer F; Rheinländer CC; Wehn N
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Efficient Implementation of NIST LWC ESTATE Algorithm Using OpenCL and Web Assembly for Secure Communication in Edge Computing Environment.
    Park B; Seo SC
    Sensors (Basel); 2021 Mar; 21(6):. PubMed ID: 33799815
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Experimental Quantum-enhanced Cryptographic Remote Control.
    Pang XL; Qiao LF; Sun K; Liu Y; Yang AL; Jin XM
    Sci Rep; 2019 Apr; 9(1):5809. PubMed ID: 30967580
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Implementing Grover's on AES-based AEAD schemes.
    Mandal S; Anand R; Rahman M; Sarkar S; Isobe T
    Sci Rep; 2024 Sep; 14(1):21105. PubMed ID: 39256404
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map.
    Ali A; Khan MA; Ayyasamy RK; Wasif M
    PeerJ Comput Sci; 2022; 8():e940. PubMed ID: 35634109
    [TBL] [Abstract][Full Text] [Related]  

  • 17. NEW MISSION AND OPPORTUNITY FOR MATHEMATICS RESEARCHERS: CRYPTOGRAPHY IN THE QUANTUM ERA.
    Chen L; Moody D
    Adv Math (N Y); 2020; 14(1):. PubMed ID: 32863386
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.
    Allakany A; Saber A; Mostafa SM; Alsabaan M; Ibrahem MI; Elwahsh H
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420868
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie-Hellman (DH) in single and multi-server queuing scenarios.
    Bhatti DS; Sidrat S; Saleem S; Malik AW; Suh B; Kim KI; Lee KC
    PLoS One; 2024; 19(1):e0293626. PubMed ID: 38271324
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.