Cryptology ePrint Archive: Report 2014/887
Available versions in chronological order
20141030:133558 (posted 30-Oct-2014 13:35:58 UTC)
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on
20141030:201008 (posted 30-Oct-2014 20:10:08 UTC)
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on
20141030:201012 (posted 30-Oct-2014 20:10:12 UTC)
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on
20141030:204302 (posted 30-Oct-2014 20:43:02 UTC)
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on
20141030:204306 (posted 30-Oct-2014 20:43:06 UTC)
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on
[
Cryptology ePrint archive
]