Multi-party computation theory to secure embedded devices KU Leuven
With the coming of information age, more and more data is being created, processed and stored in electronic form. In many applications, data is of sensitive nature. While the security mechanisms are effective in their theoretical descriptions, their implementation in systems are subject to more threats. A common pattern that appears in security breaches of embedded systems is that security collapses when a single security defect (or bug) is ...