Cryptology ePrint Archive: Report 2015/405
Available versions in chronological order
20150501:121222 (posted 01-May-2015 12:12:22 UTC)
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder
Original publication (in the same form): IACR-CRYPTO-2014
[
Cryptology ePrint archive
]