Login / Signup

How to Securely Outsource Cryptographic Computations.

Susan HohenbergerAnna Lysyanskaya
Published in: TCC (2005)
Keyphrases
  • third party
  • smart card
  • sensitive information
  • service providers
  • hash functions
  • transaction costs
  • trusted third party
  • anomaly detection
  • cellular automata
  • security protocols
  • encryption key