Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003. Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). In Ahmad-Reza Sadeghi, David Naccache, editors, Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, pages 367-386, Springer, 2010. [doi]
@incollection{JarvinenKS010, title = {Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)}, author = {Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider 0003}, year = {2010}, doi = {10.1007/978-3-642-14452-3_17}, url = {http://dx.doi.org/10.1007/978-3-642-14452-3_17}, researchr = {https://researchr.org/publication/JarvinenKS010}, cites = {0}, citedby = {0}, pages = {367-386}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, editor = {Ahmad-Reza Sadeghi and David Naccache}, series = {Information Security and Cryptography}, publisher = {Springer}, isbn = {978-3-642-14451-6}, }