Gupta, Naina; Chang, Donghoon (Advisor)
(2016-01-01)
In the modern world, almost every computing device uses some cryptographic
technique or the other. Over the years several schemes have been
proposed implemented and standardized. For any kind of data transfer the
primary ...