Founding Cryptography on Tamper-Proof Hardware Tokens.
Vipul GoyalYuval IshaiAmit SahaiRamarathnam VenkatesanAkshay WadiaPublished in: TCC (2010)
Keyphrases
- hardware and software
- low cost
- real time
- cellular automata
- neural network
- linear logic
- computing power
- theorem proving
- vlsi implementation
- computing systems
- personal computer
- theorem prover
- information security
- massively parallel
- line segments
- hardware design
- single chip
- digital circuits
- software implementation
- computer systems
- digital images
- parallel hardware