Secure computation using leaky tokens
From MaRDI portal
Publication:5167802
Recommendations
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Lower Bounds in the Hardware Token Model
- General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
- Weakening the isolation assumption of tamper-proof hardware tokens
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
Cited in
(6)- General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
- Weakening the isolation assumption of tamper-proof hardware tokens
- Secure physical computation using disposable circuits
- Cryptographic Hardware and Embedded Systems - CHES 2004
- How to construct a leakage-resilient (stateless) trusted party
- Secure set intersection with untrusted hardware tokens
This page was built for publication: Secure computation using leaky tokens
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5167802)