Research Article
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Table 16
Ranking the implementation techniques of the cryptography algorithms considering various alpha-cuts using Q-analysis.
| | Equivalence classes for the parameters with minimum relationship level (qā=ā0) | |
| | Basic sciences | | | Key | | | Hardware and steganography | | | Avalanche effect and hybrid method | | | {Artificial intelligence, software}, {occupation area, energy consumption, memory consumption} | |
|
|