Modern cryptography provides a variety of methods and protocols that allow different entities to collaborate securely without mutual trust, and hence constitutes the basic technology for a wide range of security and privacy critical applications. However, even the most basic cryptographic functionalities such as commitments, oblivious transfer, or set intersection require computationally expensive public key cryptography when implemented in software only, and their secure universal composition cannot be achieved without additional setup assumptions. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Sadeghi, A. R. (2010). Cryptography meets hardware: Selected topics of hardware-based cryptography (invited talk). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6467 LNCS, pp. 199–200). https://doi.org/10.1007/978-3-642-17619-7_15
Mendeley helps you to discover research relevant for your work.