共 50 条
- [32] Secure Two-Party Computation in a Quantum World APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
- [34] Adaptively Secure Two-Party Computation with Erasures TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
- [35] Secure Two-Party Computation: A Visual Way INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
- [36] Efficient Secure Two-Party Exponentiation TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 17 - +
- [37] Efficient Covert Two-Party Computation PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 644 - 674
- [39] Secure Two-Party Computation Based on Blind Quantum Computation International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
- [40] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 18 - 35