共 50 条
- [31] Fair secure two-party computation - Extended abstract [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 87 - 105
- [32] Secure multiparty computations using the 15 puzzle (Extended abstract) [J]. COMBINATORIAL OPTIMIZATION AND APPLICATIONS, PROCEEDINGS, 2007, 4616 : 255 - +
- [33] Secure Text Steganography [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 1 - 7
- [34] Secure untrusted binaries - Provably! [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 171 - 186
- [35] An architecture for provably secure computation [J]. LATIN 2006: THEORETICAL INFORMATICS, 2006, 3887 : 56 - 67
- [37] Provably secure metering scheme [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 388 - 398
- [38] On the Efficiency of Provably Secure NTRU [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 22 - 39
- [39] Provably Secure Homomorphic Signcryption [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 349 - 360
- [40] Provably Secure Reflection Ciphers [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT IV, 2022, 13510 : 234 - 263