共 34 条
[1]
[Anonymous], 1990, LNCS
[2]
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[3]
Asharov G., 2011, IACR CRYPTOL EPRINT, V2011, P136
[4]
Asharov G, 2011, LECT NOTES COMPUT SC, V6841, P240, DOI 10.1007/978-3-642-22792-9_14
[5]
BEAVER D, 1990, LECT NOTES COMPUT SC, V435, P560
[6]
Beaver D., 1992, CRYPTO, V576, P377, DOI DOI 10.1007/3-540-46766-1
[7]
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[9]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[10]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145