共 50 条
- [1] Secure computation of common data among malicious partners SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 345 - 354
- [5] Feasibility and Infeasibility of Secure Computation with Malicious PUFs ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 405 - 420
- [6] Feasibility and Infeasibility of Secure Computation with Malicious PUFs Journal of Cryptology, 2020, 33 : 595 - 617
- [7] Malicious Computation Prevention Protocol for Secure Multi-Party Computation TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
- [10] Two-Output Secure Computation with Malicious Adversaries ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 386 - 405