Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
1980 1
1987 1
2002 1
2004 1
2009 2
2012 2
2014 1
2015 2
2016 3
2017 5
2018 3
2020 4
2021 4
2022 8
2023 7
2024 0

Text availability

Article attribute

Article type

Publication date

Search Results

44 results

Results by year

Filters applied: . Clear all
Page 1
Therapeutic Options for the Treatment of Darier's Disease: A Comprehensive Review of the Literature.
Hanna N, Lam M, Fleming P, Lynde CW. Hanna N, et al. J Cutan Med Surg. 2022 May-Jun;26(3):280-290. doi: 10.1177/12034754211058405. Epub 2021 Nov 28. J Cutan Med Surg. 2022. PMID: 34841914 Free PMC article. Review.
Our search identified a total of 474 nonduplicate studies, which were screened by title and abstract. Of these, 155 full text articles were screened against inclusion/exclusion criteria, and 113 studies were included in our review. ...
Our search identified a total of 474 nonduplicate studies, which were screened by title and abstract. Of these, 155 full text article …
Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach.
Chaudhary N, Shahi TB, Neupane A. Chaudhary N, et al. J Imaging. 2022 Jun 10;8(6):167. doi: 10.3390/jimaging8060167. J Imaging. 2022. PMID: 35735966 Free PMC article.
One way of achieving secure image transmission over the network is encryption techniques that convert the original image into a non-understandable or scrambled form, called a cipher image, so that even if the attacker gets access to the cipher they would not be able …
One way of achieving secure image transmission over the network is encryption techniques that convert the original image into a non-understa …
Weak-keys and key-recovery attack for [Formula: see text].
Dutta P, Rajasree MS, Sarkar S. Dutta P, et al. Sci Rep. 2022 Sep 29;12(1):16313. doi: 10.1038/s41598-022-19046-2. Sci Rep. 2022. PMID: 36175451 Free PMC article.
In this paper, we study NIST lightweight 3rd round candidate [Formula: see text]. The core component of [Formula: see text] is the keyed permutation [Formula: see text], which is based on a non-linear feedback shift register. ...Our attacks are unlikely to je …
In this paper, we study NIST lightweight 3rd round candidate [Formula: see text]. The core component of [Formula: see text] is …
A novel smart photoelectric lock system: Speech transmitted by laser and speech to text.
Guo CY, Hsieh TL, Chang CC, Perng JW. Guo CY, et al. Heliyon. 2023 Mar 15;9(3):e14510. doi: 10.1016/j.heliyon.2023.e14510. eCollection 2023 Mar. Heliyon. 2023. PMID: 36967961 Free PMC article.
Also, it shows the use of a platform based on embedded ARM (Advanced RISC Machine), running a small deep learning model based on TDNN (Time delay neural network) and LSTM (Long short-term memory), and converting speech to text, and use the text cipher for unl …
Also, it shows the use of a platform based on embedded ARM (Advanced RISC Machine), running a small deep learning model based on TDNN (Time …
Memristor-based PUF for lightweight cryptographic randomness.
Ibrahim HM, Abunahla H, Mohammad B, AlKhzaimi H. Ibrahim HM, et al. Sci Rep. 2022 May 23;12(1):8633. doi: 10.1038/s41598-022-11240-6. Sci Rep. 2022. PMID: 35606367 Free PMC article.
Additionally, this paper explores the applicability of our MR-PUF on block ciphers to improve the randomness achieved within the encryption process. Our MR-PUF has been used on block ciphers to construct a TRNG cipher block that successfully passed the NIST t …
Additionally, this paper explores the applicability of our MR-PUF on block ciphers to improve the randomness achieved within the encr …
Caps and progression-free sets in Z m n.
Elsholtz C, Pach PP. Elsholtz C, et al. Des Codes Cryptogr. 2020;88(10):2133-2170. doi: 10.1007/s10623-020-00769-0. Epub 2020 Jun 16. Des Codes Cryptogr. 2020. PMID: 33071461 Free PMC article.
We give lower bound constructions, which e.g. include that [Formula: see text] , when m is even. When m = 4 this is of order at least [Formula: see text] . ...
We give lower bound constructions, which e.g. include that [Formula: see text] , when m is even. When m = 4 this is of order at least …
Deciphering the Hermeticae Philosophiae Medulla: Textual Cultures of Alchemical Secrecy.
Piorko M, Lang S, Bean R. Piorko M, et al. Ambix. 2023 May;70(2):150-183. doi: 10.1080/00026980.2023.2201744. Epub 2023 May 10. Ambix. 2023. PMID: 37162130
The essay explores the medical and alchemical context for the manuscript into which the cipher was copied and provides the transcription, plaintext solution (in Latin), and English translation of the encrypted text. Further, it interprets the enciphered text
The essay explores the medical and alchemical context for the manuscript into which the cipher was copied and provides the transcript …
Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys.
Lin CH, Hu GH, Chen JS, Yan JJ, Tang KH. Lin CH, et al. Multimed Syst. 2022;28(5):1793-1808. doi: 10.1007/s00530-022-00950-6. Epub 2022 May 21. Multimed Syst. 2022. PMID: 35615102 Free PMC article.
In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback) encryption algorithm with SDKGs to encrypt the video/audio streaming. Then the cipher-text is transmitted to the receiver via the network public channel and it can be fully …
In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback) encryption algorithm with SDKGs to encrypt the …
A study of text-theoretical approach to S-box construction with image encryption applications.
Mahboob A, Nadeem M, Rasheed MW. Mahboob A, et al. Sci Rep. 2023 Nov 29;13(1):21081. doi: 10.1038/s41598-023-47607-6. Sci Rep. 2023. PMID: 38030677 Free PMC article.
A substitution box (S-box) is the basic component for modern block ciphers, which helps to ensure robust security of plain data while encryption and permits its lawful decipherment. ...
A substitution box (S-box) is the basic component for modern block ciphers, which helps to ensure robust security of plain data while …
44 results