Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003. Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). In Ahmad-Reza Sadeghi, David Naccache, editors, Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, pages 367-386, Springer, 2010. [doi]

@incollection{JarvinenKS010,
  title = {Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)},
  author = {Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider 0003},
  year = {2010},
  doi = {10.1007/978-3-642-14452-3_17},
  url = {http://dx.doi.org/10.1007/978-3-642-14452-3_17},
  researchr = {https://researchr.org/publication/JarvinenKS010},
  cites = {0},
  citedby = {0},
  pages = {367-386},
  booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  editor = {Ahmad-Reza Sadeghi and David Naccache},
  series = {Information Security and Cryptography},
  publisher = {Springer},
  isbn = {978-3-642-14451-6},
}