Cryptology ePrint Archive: Report 2014/467
Available versions in chronological order
20140617:155611 (posted 17-Jun-2014 15:56:11 UTC)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Daniel Demmler and Thomas Schneider and Michael Zohner
Original publication (with major differences): USENIX Security Symposium 2014
20140703:120234 (posted 03-Jul-2014 12:02:34 UTC)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Daniel Demmler and Thomas Schneider and Michael Zohner
Original publication (with major differences): USENIX Security Symposium 2014
20140703:120925 (posted 03-Jul-2014 12:09:25 UTC)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Daniel Demmler and Thomas Schneider and Michael Zohner
Original publication (with major differences): USENIX Security Symposium 2014
[
Cryptology ePrint archive
]