A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources memory, CPU speed by oloading implementations of data structures on to an available but insecure, untrusted fast co-processor. However, data structures such as stacks, queues, RAMS, and hash tables can be corrupted and made to behave incorrectly by a potentially hostile implementation platform or by an adversary knowingdoi:10.1109/32.979991 fatcat:vl4feaoa4vahdhtdsgdyxlbbhe