"How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware."

Guy N. Rothblum (2012)

Details and statistics

DOI: 10.1007/978-3-642-32009-5_32

access: open

type: Conference or Workshop Paper

metadata version: 2018-06-26

a service of  Schloss Dagstuhl - Leibniz Center for Informatics