Inproceedings,

Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.

, , , and .
ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 140-160. Springer, (2013)

Meta data

Tags

Users

  • @dblp

Comments and Reviews