Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003. Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). In Ahmad-Reza Sadeghi, David Naccache, editors, Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, pages 367-386, Springer, 2010. [doi]

Abstract

Abstract is missing.