共 50 条
- [21] Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model International Journal of Information Security, 2017, 16 : 577 - 601
- [24] POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 245 - 257
- [25] An efficient protocol for secure two-party computation in the presence of malicious adversaries ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
- [26] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Journal of Cryptology, 2015, 28 : 312 - 350
- [28] Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice 2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
- [29] Secure two-party computation of Squared Euclidean Distances in the presence of malicious adversaries INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 138 - 152
- [30] Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 297 - 314