共 50 条
- [21] Reusable Non-Interactive Secure Computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 462 - 488
- [22] Signcryption with Non-interactive Non-repudiation [J]. Designs, Codes and Cryptography, 2005, 37 : 81 - 109
- [23] A non-interactive multiple model tracker [J]. ACQUISITION, TRACKING, AND POINTING XVII, 2003, 5082 : 65 - 76
- [24] A Survey of Non-Interactive Key Exchange [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 558 - 574
- [25] Efficient Non-interactive Range Proof [J]. COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 138 - +
- [26] Non-interactive oblivious transfer protocols [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 120 - +
- [27] Non-interactive cryptosystem for entity authentication [J]. INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 72 - 84
- [29] Towards Non-interactive Witness Hiding [J]. THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 : 627 - 656
- [30] Efficient Non-interactive Secure Computation [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 406 - +