共 50 条
- [4] An efficient protocol for secure two-party computation in the presence of malicious adversaries ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
- [5] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Journal of Cryptology, 2015, 28 : 312 - 350
- [6] Secure Biometric Verification in the Presence of Malicious Adversaries IEEE ACCESS, 2025, 13 : 5284 - 5295
- [7] Secure keyword search in the presence of malicious adversaries Journal of Computational Information Systems, 2012, 8 (22): : 9581 - 9591
- [8] Two-Output Secure Computation with Malicious Adversaries ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 386 - 405
- [9] Secure two-party computation of Squared Euclidean Distances in the presence of malicious adversaries INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 138 - 152
- [10] Computationally Secure Pattern Matching in the Presence of Malicious Adversaries ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 195 - 212