Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

Reference:

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Efficient secure two-party computation with untrusted hardware tokens. In Ahmad-Reza Sadeghi and David Naccache, editors, Towards Hardware-Intrinsic Security, pages 367–386. Springer, 2010.

Suggested BibTeX entry:

@incollection{bookch:hwsfe,
    author = {Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider},
    booktitle = {Towards Hardware-Intrinsic Security},
    editor = {Ahmad-Reza Sadeghi and David Naccache},
    language = {eng},
    pages = {367-386},
    publisher = {Springer},
    title = {Efficient Secure Two-Party Computation with Untrusted Hardware Tokens},
    year = {2010},
}

See dx.doi.org ...