@dblp

Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion).

. Security Protocols Workshop, Volume 14186 von Lecture Notes in Computer Science, Seite 38-42. Springer, (2023)

Links und Ressourcen

Tags