Cryptology ePrint Archive: Report 2014/887

Available versions in chronological order


Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on

Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on

Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on

Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on

Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
Original publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on


[ Cryptology ePrint archive ]