Linked e-resources
Details
Table of Contents
Introduction
A Review on Perfect Secrecy
Perfect Secrecy and Boolean Functions with Applications in Resource-Constrained IoT Environments
Cryptography in IoT
Resilient functions
Modeling a General Cryptographic Algorithm
Latin Squares and Cryptography
Perfectly-Secure Encryption Modeled Using Latin Squares
Conclusion.
A Review on Perfect Secrecy
Perfect Secrecy and Boolean Functions with Applications in Resource-Constrained IoT Environments
Cryptography in IoT
Resilient functions
Modeling a General Cryptographic Algorithm
Latin Squares and Cryptography
Perfectly-Secure Encryption Modeled Using Latin Squares
Conclusion.