Search alternatives:
power encryption » after encryption (Expand Search), power generation (Expand Search)
power encryption » after encryption (Expand Search), power generation (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
Histogram analysis and entropy analysis of Gaussian noise image and encrypted image.
Published 2022Subjects: -
13
-
14
Pixel correlation analysis of plain image Peppers and corresponding encrypted image.
Published 2022Subjects: -
15
-
16
Histogram analysis and entropy analysis of salt-and-pepper noise image and encrypted image.
Published 2022Subjects: -
17
-
18
-
19
Power consumption for SHA256 software algorithm.
Published 2023“…A specific (dedicated) circuit is designed to implement the compression technique, generate the blockchain hash values and data encryption. The compression algorithm is based on chaotic theory. …”
-
20