Login / Signup
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques.
Anthony Demeri
Thomas Conroy
Alex Nolan
William Diehl
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
security analysis
hardware software
hw sw
encryption scheme
design methodology
case study
embedded systems
public key
design process
distributed systems