共 48 条
- [31] Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 629 - 659
- [33] Efficient Implementation of Finite Field Arithmetic for Binary Ring-LWE Post-Quantum Cryptography Through a Novel Lookup-Table-Like Method 2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2021, : 1279 - 1284
- [34] Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation 2020 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2020,
- [35] Two-Round Oblivious Linear Evaluation from Learning with Errors PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 379 - 408
- [36] Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 345 - 360
- [37] Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE PROCEEDINGS OF THE 55TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2023, 2023, : 595 - 608
- [38] Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation INFORMATION THEORETIC SECURITY, 2009, 4883 : 183 - +
- [40] EFFICIENT EVALUATION OF LINEAR-RECURSIONS WITH FUNCTION SYMBOLS IN DEDUCTIVE DATABASES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, 1991, 542 : 132 - 141