共 50 条
- [41] A Scripting Language for Automating Secure Multiparty Computation [J]. 2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 127 - 134
- [42] Non-Interactive Secure Multiparty Computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
- [43] Bit Decomposition Protocols in Secure Multiparty Computation [J]. WAHC'18: PROCEEDINGS OF THE 6TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, 2018, : 37 - 48
- [44] Secure Multiparty RAM Computation in Constant Rounds [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
- [45] Proactive Secure Multiparty Computation with a Dishonest Majority [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 200 - 215
- [46] Leveraging Secure Multiparty Computation in the Internet of Things [J]. MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 508 - 510
- [47] On 2-round secure multiparty computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 178 - 193
- [48] Secure Multiparty Computation and Application in Machine Learning [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2163 - 2186
- [50] REALIZING SECURE MULTIPARTY COMPUTATION ON INCOMPLETE NETWORKS [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 270 - 277