共 50 条
- [41] An improved secure two-party computation protocol INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 221 - 232
- [42] Secure Two-Party Computation with Low Communication THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 54 - 74
- [43] Efficient Fair Secure Two-Party Computation 2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 243 - 248
- [44] Fairplay - A secure two-party computation system USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 287 - 302
- [46] Secure Two-Party Computation in a Quantum World APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
- [47] Adaptively Secure Two-Party Computation with Erasures TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
- [48] Secure Two-Party Computation: A Visual Way INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
- [50] Secure two-party computation of Squared Euclidean Distances in the presence of malicious adversaries INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 138 - 152