Login / Signup
Minimizing Trust in Hardware Wallets with Two Factor Signatures.
Antonio Marcedone
Rafael Pass
Abhi Shelat
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
low cost
hardware and software
real time
trust evaluation
trusted computing
trust model
computer systems
embedded systems
hardware architecture
neural network
signature verification
computing power
computational power
management system
image processing
factor analysis
vlsi implementation
digital signal processor