共 50 条
- [1] Revisiting the efficiency of malicious two-party computation Advances in Cryptology - EUROCRYPT 2007, 2007, 4515 : 79 - 96
- [2] Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 2 - +
- [3] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Journal of Cryptology, 2015, 28 : 312 - 350
- [4] An efficient protocol for secure two-party computation in the presence of malicious adversaries ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
- [6] Secure two-party computation of Squared Euclidean Distances in the presence of malicious adversaries INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 138 - 152
- [8] Geometry of Secure Two-party Computation 2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
- [9] Secure Two-Party Computation Is Practical ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
- [10] On Statistical Security in Two-Party Computation THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 532 - 561