Login / Signup

An area-optimized serial implementation of ICEPOLE authenticated encryption schemes.

Michael TempelmeierFabrizio De SantisJens-Peter KapsGeorg Sigl
Published in: HOST (2016)
Keyphrases
  • encryption scheme
  • authentication scheme
  • secret key
  • databases
  • multiresolution
  • hash functions