14
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Theory of Cryptography 

      Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references22

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Universally composable security: a new paradigm for cryptographic protocols

          R. Canetti (2025)
            Bookmark
            • Record: found
            • Abstract: not found
            • Book: not found

            Foundations of Cryptography

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              On the (Im)possibility of Obfuscating Programs

                Bookmark

                Author and book information

                Book Chapter
                2013
                : 642-661
                10.1007/978-3-642-36594-2_36
                7a8dec5f-1c4e-4057-95c2-468b48a5dd31
                History

                Comments

                Comment on this book

                Book chapters

                Similar content3,452

                Cited by2