Login / Signup
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks.
Ryan Karl
Timothy Burchfield
Jonathan Takeshita
Taeho Jung
Published in:
SecureComm (2) (2019)
Keyphrases
</>
trusted computing
security mechanisms
security protocols
chosen plaintext
advanced encryption standard
cryptographic protocols
stream cipher
low cost
real time
secure routing
computing platform
remote attestation
security issues
computer systems
cryptographic algorithms
protection schemes
secure multi party