Abstract

Among instances when the data security in resource constrained environment is taken into consideration, lightweight encryption algorithms admit in popularity and are deemed to be of great merit. Re...

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call