Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Crossref DOI link: https://doi.org/10.1007/s00145-019-09329-9
Published Online: 2019-07-09
Published Print: 2020-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Dachman-Soled, Dana
Fleischhacker, Nils
Katz, Jonathan
Lysyanskaya, Anna
Schröder, Dominique
Text and Data Mining valid from 2019-07-09
Version of Record valid from 2019-07-09
Article History
Received: 15 January 2018
Revised: 27 June 2019
First Online: 9 July 2019