Design, Hardware Implementation, and Application in Video Encryption of the 2-D Memristive Cubic Map
Abstract: Chaos systems find extensive applications in cryptography and pseudorandom number generation due to their ability to generate pseudo-random signals. This article focuses on enhancing the ...
Abstract: Cryptographic hash functions play a pivotal role in ensuring the security and integrity of data in various applications such as online banking, secure communications, and digital signatures.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results