Sign in

How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware.

Guy N. Rothblum
Published in: CRYPTO (2012)
Keyphrases