共 50 条
- [1] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model Journal of Cryptology, 2019, 32 : 1144 - 1199
- [2] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553
- [4] Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Journal of Cryptology, 2003, 16 : 143 - 184
- [5] Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 21 - 37
- [6] Distributed Oblivious RAM for Secure Two-Party Computation THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
- [7] Round-optimal secure two-party computation ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
- [8] Geometry of Secure Two-party Computation 2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
- [9] Secure Two-Party Computation Is Practical ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
- [10] On the Power of Secure Two-Party Computation ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429