Login / Signup

Algorithms and Architectures for Use in FPGA Implementations of Identity Based Encryption Schemes.

Tim KerinsEmanuel M. PopoviciWilliam P. Marnane
Published in: FPL (2004)
Keyphrases
  • encryption scheme
  • software implementation
  • hardware architectures
  • data structure
  • computational complexity
  • image quality
  • ciphertext