Sign in

Feasibility and Infeasibility of Secure Computation with Malicious PUFs.

Dana Dachman-SoledNils FleischhackerJonathan KatzAnna LysyanskayaDominique Schröder
Published in: J. Cryptol. (2020)
Keyphrases
  • feasible solution