How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware.
Guy N. RothblumPublished in: CRYPTO (2012)
Keyphrases
- real time
- low cost
- information leakage
- data acquisition
- hardware and software
- computing power
- image processing
- previously mentioned
- parallel hardware
- hardware implementation
- computing systems
- security requirements
- security mechanisms
- key management
- security analysis
- security protocols
- standard model
- cryptographic protocols
- personal computer
- constraint satisfaction
- lightweight