Login / Signup
New Constructions for UC Secure Computation using Tamper-proof Hardware.
Nishanth Chandran
Vipul Goyal
Amit Sahai
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
low cost
security properties
real time
hardware and software
security level
protection scheme
trusted computing
parallel computation
multi party
security analysis
security requirements
theorem prover
computer systems
computing systems
hardware implementation
personal computer
linear logic
image processing