Hardware Implementation of Secure Shamir's Secret Sharing Scheme.
Pei LuoAndy Yu-Lun LinZhen WangMark G. KarpovskyPublished in: HASE (2014)
Keyphrases
- hardware implementation
- secret sharing scheme
- secret sharing
- key management
- authentication mechanism
- encryption scheme
- efficient implementation
- visual cryptography
- visual cryptography scheme
- signal processing
- wireless sensor networks
- image processing algorithms
- resource constrained
- ad hoc networks
- field programmable gate array
- black and white
- secret image
- elliptic curve
- end to end
- image processing
- secret key
- wireless networks
- lightweight
- pattern recognition