Efficient secure two-party computation with untrusted hardware tokens (2010)

by K Järvinen, V Kolesnikov, A-R Sadeghi, T Schneider
Venue:In Towards Hardware Intrinsic Security: Foundation and Practice, Information Security and Cryptography