共 13 条
- [1] CRYPTFLow2: Practical 2-Party Secure Inference [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 325 - 342
- [2] A Linear-Time 2-Party Secure Merge Protocol [J]. CYBER SECURITY, CRYPTOLOGY, AND MACHINE LEARNING, 2022, 13301 : 408 - 427
- [3] A Nearly Tight Sum-of-Squares Lower Bound for the Planted Clique Problem [J]. 2016 IEEE 57TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2016, : 428 - 437
- [5] SECFLOAT: Accurate Floating-Point meets Secure 2-Party Computation [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 576 - 595
- [6] The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 167 - 187
- [7] Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution [J]. PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 297 - 314
- [8] Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 256 - 273
- [9] CA-KEP : A Secure CA Based 2-Party Key Exchange Protocol [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (04): : 193 - 206
- [10] A Tight Lower Bound on Adaptively Secure Full-Information Coin Flip [J]. 2020 IEEE 61ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2020), 2020, : 1268 - 1276