Login / Signup
Circuits Resilient to Additive Attacks with Applications to Secure Computation.
Daniel Genkin
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
Eran Tromer
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
security protocols
security mechanisms
cryptographic protocols
stream cipher
secure routing
countermeasures
chosen plaintext
security measures
high speed
key management
security threats
security issues
insider attacks
computer security
java card