Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

In Towards Hardware-Intrinsic Security: Foundations and Practice, Information Security and Cryptography, Springer-Verlag, September 2010.

Tags: evaluation, Function, Hardware, secure, Token