共 50 条
- [1] Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Journal of Cryptology, 2003, 16 : 143 - 184
- [2] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model Journal of Cryptology, 2019, 32 : 1144 - 1199
- [3] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553
- [5] Constant-round coin-tossing with a man in the middle or realizing the shared random string model FOCS 2002: 43RD ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2002, : 345 - 355
- [6] Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output ADVANCES IN CRYPTOLOGY, PT V, EUROCRYPT 2024, 2024, 14655 : 122 - 154
- [7] Round-optimal secure two-party computation ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
- [8] Geometry of Secure Two-party Computation 2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
- [9] Secure Two-Party Computation Is Practical ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
- [10] On the Power of Secure Two-Party Computation ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429