-
1
-
-
0028114541
-
Molecular computation of solutions to combinatorial problems
-
Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Science 266:1021-1024 (Pubitemid 24373714)
-
(1994)
Science
, vol.266
, Issue.5187
, pp. 1021-1024
-
-
Adleman, L.M.1
-
2
-
-
84874665403
-
Introduction to Secure PRNGs
-
doi: 10.4236/ijcns.2011.410074
-
Babaei M, Farhadi M (2011) Introduction to Secure PRNGs. Int'l J Communi Network Sys Sci 4(10):616-621. doi: 10.4236/ijcns.2011.410074
-
(2011)
Int'l J Communi Network Sys Sci
, vol.4
, Issue.10
, pp. 616-621
-
-
Babaei, M.1
Farhadi, M.2
-
3
-
-
84862873154
-
Improved performance of LFSR's system with discrete chaotic iterations
-
Babaei M, Ramyar M (2011) Improved performance of LFSR's system with discrete chaotic iterations. Word Appl Sci J 13(7):1720-1725.
-
(2011)
Word Appl Sci J
, vol.13
, Issue.7
, pp. 1720-1725
-
-
Babaei, M.1
Ramyar, M.2
-
4
-
-
0035823240
-
Long-term storage of in-formation in DNA
-
10.1126/science.293.5536.1763c
-
Bancroft C, Bowler T, Bloom B et al (2001) Long-term storage of in-formation in DNA. Science 293:1763-1765
-
(2001)
Science
, vol.293
, pp. 1763-1765
-
-
Bancroft, C.1
Bowler, T.2
Bloom, B.3
-
5
-
-
77950597987
-
DNA computing and its application to information security field
-
doi: 10.1109/ICNC.2009.27
-
Cui G, Li C, Li H, Li X (2009) DNA computing and its application to information security field. In: International conference on natural computation, pp 148-152. doi: 10.1109/ICNC.2009.27
-
(2009)
International Conference on Natural Computation
, pp. 148-152
-
-
Cui, G.1
Li, C.2
Li, H.3
Li, X.4
-
6
-
-
84874659239
-
DNA cryptography
-
10.1038/10813 10.1038/10812
-
Dove A (1999) DNA cryptography. J Nat Biotechnol 17:625. doi: 10.1038/10813
-
(1999)
J Nat Biotechnol
, vol.17
, pp. 625
-
-
Dove, A.1
-
7
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
doi: 10.1109/TIT.1985.1057074
-
El Gamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469-472. doi: 10.1109/TIT.1985.1057074
-
(1985)
IEEE Trans Inf Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
8
-
-
12444321874
-
DNA-based cryptography
-
Cambridge, MA, June 1999
-
Gehani A, LaBean T, Reif J (1999) DNA-based cryptography. In: 5th annual DIMACS meeting on DNA based computers (DNA 5), MIT, Cambridge, MA, June 1999
-
(1999)
5th Annual DIMACS Meeting on DNA Based Computers (DNA 5), MIT
-
-
Gehani, A.1
Labean, T.2
Reif, J.3
-
9
-
-
84870835420
-
Stateless multicounter 5′→3′ Watson-Crick automata: The deterministic case
-
doi: 10.1007/s11047-011-9290-9
-
Hegedüs L, Nagy B, Eǧecioǧlu Ö (2011) Stateless multicounter 5′→3′ Watson-Crick automata: the deterministic case. Nat Comput. doi: 10.1007/s11047-011-9290-9
-
(2011)
Nat Comput
-
-
Hegedüs, L.N.1
-
10
-
-
77952524269
-
-
Oxford University Press, Nucleic Acids Symposium Series No. 53, 27th September 2009 doi: 10.1093/nass/nrp040
-
Hirabayashi M, Kojima H, Oiwa K (2009) Effective algorithm to encrypt information based on self-assembly of DNA tiles. Oxford University Press, Nucleic Acids Symposium Series No. 53, 27th September 2009, pp 79-80. doi: 10.1093/nass/nrp040
-
(2009)
Effective Algorithm to Encrypt Information Based on Self-assembly of DNA Tiles
, pp. 79-80
-
-
Hirabayashi, M.1
Kojima, H.2
Oiwa, K.3
-
12
-
-
0033843028
-
Cryptography with DNA binary strands
-
DOI 10.1016/S0303-2647(00)00083-6, PII S0303264700000836
-
Leier A, Richter C, Banzhaf W, Rauhe H (2000) Special cryptography with DNA binary strands. J Biosyst 57(1):13-22 (Pubitemid 30665402)
-
(2000)
BioSystems
, vol.57
, Issue.1
, pp. 13-22
-
-
Leier, A.1
Richter, C.2
Banzhaf, W.3
Rauhe, H.4
-
13
-
-
0030725521
-
DNA solution of the maximal clique problem
-
DOI 10.1126/science.278.5337.446
-
Ouyang Q, Kaplan PD, Liu S et al (1997) DNA solution of the maximal clique problem. Science 278:446-449 (Pubitemid 27454425)
-
(1997)
Science
, vol.278
, Issue.5337
, pp. 446-449
-
-
Ouyang, Q.1
Kaplan, P.D.2
Liu, S.3
Libchaber, A.4
-
14
-
-
84942103417
-
Improving middle square method RNG using chaotic map
-
doi: 10.4236/am.2011.24062
-
Rahimov H, Babaei M, Hassanabadi H (2011) Improving middle square method RNG using chaotic map. Int J Appl Math 137-141.doi: 10.4236/am.2011.24062
-
(2011)
Int J Appl Math
, pp. 137-141
-
-
Rahimov, H.1
Babaei, M.2
Hassanabadi, H.3
-
15
-
-
84874657749
-
Cryptographic PRNG based on combination of LFSR and chaotic logistic map
-
doi: 10.4236/am.2011.212217
-
Rahimov H, Babaei M, Farhadi M (2011) Cryptographic PRNG based on combination of LFSR and chaotic logistic map. Appl Math 2:1531-1534. doi: 10.4236/am.2011.212217
-
(2011)
Appl Math
, vol.2
, pp. 1531-1534
-
-
Rahimov, H.1
Babaei, M.2
Farhadi, M.3
-
17
-
-
0034685812
-
Molecular computation by DNA hairpin formation
-
DOI 10.1126/science.288.5469.1223
-
Sakamoto K, Gouzu H, Komiya K et al (2000) Molecular computation by DNA hairpin formation. Science 288:1223-1226 (Pubitemid 30367195)
-
(2000)
Science
, vol.288
, Issue.5469
, pp. 1223-1226
-
-
Sakamoto, K.1
Gouzu, H.2
Komiya, K.3
Kiga, D.4
Yokoyama, S.5
Yokomori, T.6
Hagiya, M.7
-
18
-
-
84874657530
-
The One-Time Pad algorithm - The simplest and most secure way to keep secrets
-
doi: 10.1007/978-3-642-15328-0-15
-
Tantau T (2011) The One-Time Pad algorithm - the simplest and most secure way to keep secrets. Book chapter, Algorithms Unplugged, Part 2, pp 141-146. doi: 10.1007/978-3-642-15328-0-15
-
(2011)
Book Chapter, Algorithms Unplugged, Part 2
, pp. 141-146
-
-
Tantau, T.1
-
19
-
-
33748938054
-
New field of cryptography: DNA cryptography
-
doi: 10.1007/s11434-006-2012-5
-
Xiao G, Lu M, Qin L, Lai X (2012) New field of cryptography: DNA cryptography. Chinese Sci Bull 51(12):1413-1420. doi: 10.1007/s11434-006-2012-5
-
(2012)
Chinese Sci Bull
, vol.51
, Issue.12
, pp. 1413-1420
-
-
Xiao, G.1
Lu, M.2
Qin, L.3
Lai, X.4
|