Research Article
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Table 13
Set of dis and cis; the techniques employed for implementing cryptography algorithms.
| Flexibility | | Fuzzy logic | | Storage space | | Cycle | | Avalanche effect | | Scalability | | Software | | Clustering | | Multiple step | | Digital signature | | Speed | | Steganography | | Key | | Hybrid method | | Block size | | Reliability | | Music harmony | | Graph | | Hardware | | Image sharing | | | | Artificial intelligence | | Characteristic oriented | | Hardware | | Parallel processing | | | | Security | | Energy consumption | | Occupation area | | Threshold technique | | | | Simplicity | | Bandwidth consumption | | Basic science | | Data mining | | | | Resources | | Memory consumption | | Compression | | Binary tree | |
|
|