Login / Signup

Timing Evaluation of the Known Cryptographic Algorithms.

Yan WangMing Hu
Published in: CIS (2) (2009)
Keyphrases
  • cryptographic algorithms
  • digital images
  • security protocols
  • image processing
  • feature extraction