Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Nico DöttlingThilo MieJörn Müller-QuadeTobias NilgesPublished in: TCC (2013)
Keyphrases
- low cost
- hardware and software
- real time
- third party
- privacy preserving
- hardware implementation
- computer systems
- theorem prover
- image processing
- theorem proving
- hardware architecture
- single chip
- computational power
- linear logic
- massively parallel
- computing power
- vlsi implementation
- parallel hardware
- digital watermarking
- computing systems
- security policies
- data sharing
- line segments
- information systems
- data sets