共 50 条
- [43] Bounded-concurrent secure two-party computation in a constant number of rounds 44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, : 404 - 413
- [44] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553
- [45] Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, : 497 - 509
- [46] Multiparty computation with full computation power and reduced overhead EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 241 - 248
- [47] Cryptanalysis of secure arithmetic coding 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1769 - 1772
- [49] Computational Secure ORAM (COMP SE-ORAM) with (ω)over-tilde(log n) overhead 2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 99 - 102