Threshold Implementations of the Present Cipher
"The process of securing data has always been a challenge since it is related to the safety of people and society. Nowadays, there are many cryptographic algorithms developed to solve security problems. However, some applications have constraints which make it difficult to achieve high levels o...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Digital WPI
2017
|
Subjects: | |
Online Access: | https://digitalcommons.wpi.edu/etd-theses/1024 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=2023&context=etd-theses |