Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks.
Ryan KarlTimothy BurchfieldJonathan TakeshitaTaeho JungPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- trusted computing
- low cost
- secure routing
- computer security
- security mechanisms
- stream cipher
- security protocols
- real time
- cryptographic protocols
- security measures
- secure multi party
- chosen plaintext
- countermeasures
- security issues
- hardware and software
- embedded systems
- security threats
- closed loop
- computer systems
- watermarking scheme
- security requirements
- key management
- intrusion detection