Return to Article Details An Efficient Algorithm for High Throughput and Low Power for Security Application’s Download Download PDF