2010 | OriginalPaper | Chapter
Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk)
Author : Ahmad-Reza Sadeghi
Published in: Cryptology and Network Security
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Modern cryptography provides a variety of methods and protocols that allow different entities to collaborate securely without mutual trust, and hence constitutes the basic technology for a wide range of security and privacy critical applications. However, even the most basic cryptographic functionalities such as commitments, oblivious transfer, or set intersection require computationally expensive public key cryptography when implemented in software only, and their secure universal composition cannot be achieved without additional setup assumptions.