Research Article

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Figure 12

System complexity of cryptography algorithm implementation techniques for different alpha-cuts.