共 24 条
[1]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[2]
Chandran N, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P1361
[3]
Cramer R, 2005, LECT NOTES COMPUT SC, V3378, P342
[4]
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority<bold> </bold>
[J].
PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022,
2022,
:653-666
[5]
Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
[6]
Evans D., 2018, Privacy and Security, V2, P70
[7]
Juvekar C, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1651
[8]
Karpathy Andrej., 2019, Convolutional Neural Networks for Visual Recognition
[9]
Koti A., 2022, NETW DISTRIB SYST SE, P24
[10]
Koti N, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2651