Linked e-resources

Details

Introduction
A Review on Perfect Secrecy
Perfect Secrecy and Boolean Functions with Applications in Resource-Constrained IoT Environments
Cryptography in IoT
Resilient functions
Modeling a General Cryptographic Algorithm
Latin Squares and Cryptography
Perfectly-Secure Encryption Modeled Using Latin Squares
Conclusion.

Browse Subjects

Show more subjects...

Statistics

from
to
Export