共 50 条
- [41] Efficient Secure Two-Party Exponentiation TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 17 - +
- [42] LEGO for Two-Party Secure Computation THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 368 - 386
- [45] Is Our Two-Party System "Natural"? ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 1948, 259 : 1 - 9
- [46] Secure Two-Party Computational Geometry Journal of Computer Science and Technology, 2005, 20 : 258 - 263
- [48] Efficient Covert Two-Party Computation PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 644 - 674
- [50] Two-party computing with encrypted data ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 298 - +