Abstract: JavaScript is rapidly being deployed as binaries in security-critical embedded domains, including IoT devices, edge computing, and smart automotive applications. Ensuring the security of ...
Design, Hardware Implementation, and Application in Video Encryption of the 2-D Memristive Cubic Map
Abstract: Chaos systems find extensive applications in cryptography and pseudorandom number generation due to their ability to generate pseudo-random signals. This article focuses on enhancing the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results