Cryptography meets hardware: Selected topics of hardware-based cryptography (invited talk)

0Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Modern cryptography provides a variety of methods and protocols that allow different entities to collaborate securely without mutual trust, and hence constitutes the basic technology for a wide range of security and privacy critical applications. However, even the most basic cryptographic functionalities such as commitments, oblivious transfer, or set intersection require computationally expensive public key cryptography when implemented in software only, and their secure universal composition cannot be achieved without additional setup assumptions. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Sadeghi, A. R. (2010). Cryptography meets hardware: Selected topics of hardware-based cryptography (invited talk). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6467 LNCS, pp. 199–200). https://doi.org/10.1007/978-3-642-17619-7_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free