共 50 条
- [2] Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1303 - 1307
- [3] Geometry of Secure Two-party Computation 2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
- [4] Secure Two-Party Computation Is Practical ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
- [5] On Statistical Security in Two-Party Computation THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 532 - 561
- [6] Secrecy of two-party secure computation DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
- [7] On the Power of Secure Two-Party Computation ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
- [8] LEGO for Two-Party Secure Computation THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 368 - 386
- [9] Efficient Covert Two-Party Computation PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 644 - 674