Login / Signup
Speeding Up Secret Computations with Insecure Auxiliary Devices.
Tsutomu Matsumoto
Koki Kato
Hideki Imai
Published in:
CRYPTO (1988)
Keyphrases
</>
secret key
mobile devices
mobile applications
authentication scheme
intelligent environments
smart phones
information retrieval
case study
digital images
spatial domain
public key
standard model
processing capabilities
handheld devices
embedded devices
secure communication