Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (2010)
AUTHORS:
Järvinen Kimmo
,
Kolesnikov Vladimir,
Sadeghi Ahmad-Reza,
Schneider Thomas
URL:
http://dx.doi.org/10.1007/978-3-642-14452-3_17
@incollection{ bookch:hwsfe, editor = "Sadeghi, Ahmad-Reza and Naccache, David", author = "Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas", publisher = "Springer", language = "eng", title = "Efficient Secure Two-Party Computation with Untrusted Hardware Tokens", url = "http://dx.doi.org/10.1007/978-3-642-14452-3_17", booktitle = "Towards Hardware-Intrinsic Security", corerank = "NA", responsibleauthor = "Järvinen, Kimmo", flags = "CRYPTO", il = "yes", year = "2010", unitcode = "T306=100", impactfactor = "B2", pages = "367-386" }