Cryptanalysis of an embedded systems' image encryption.
Imad El HanoutiHakim el FadiliKhalid ZenkouarPublished in: Multim. Tools Appl. (2021)
Keyphrases
- embedded systems
- image encryption
- authentication scheme
- secret key
- low cost
- security analysis
- embedded software
- chaotic maps
- signature scheme
- smart card
- private key
- public key
- wireless communication
- hash functions
- software systems
- secret sharing
- s box
- query processing
- protocol stack
- image scrambling
- computer networks
- resource constrained
- digital images
- artificial intelligence