Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003. Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). In Ahmad-Reza Sadeghi, David Naccache, editors, Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, pages 367-386, Springer, 2010. [doi]

Authors

Kimmo Järvinen

This author has not been identified. Look up 'Kimmo Järvinen' in Google

Vladimir Kolesnikov

This author has not been identified. Look up 'Vladimir Kolesnikov' in Google

Ahmad-Reza Sadeghi

This author has not been identified. Look up 'Ahmad-Reza Sadeghi' in Google

Thomas Schneider 0003

This author has not been identified. Look up 'Thomas Schneider 0003' in Google