Hardware Implementation of Secure Shamir's Secret Sharing Scheme.
Pei LuoAndy Yu-Lun LinZhen WangMark G. KarpovskyPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- hardware implementation
- secret sharing scheme
- secret sharing
- key management
- authentication mechanism
- encryption scheme
- visual cryptography scheme
- signal processing
- efficient implementation
- visual cryptography
- ad hoc networks
- image processing algorithms
- wireless sensor networks
- field programmable gate array
- lightweight
- secret image
- resource constrained
- multi party
- black and white
- real time
- face recognition
- neural network