Login / Signup
An area-optimized serial implementation of ICEPOLE authenticated encryption schemes.
Michael Tempelmeier
Fabrizio De Santis
Jens-Peter Kaps
Georg Sigl
Published in:
HOST (2016)
Keyphrases
</>
encryption scheme
authentication scheme
secret key
databases
multiresolution
hash functions