共 50 条
[1]
Abdalla M, 2002, LECT NOTES COMPUT SC, V2332, P418
[2]
Cryptography in NC0
[J].
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2004,
:166-175
[3]
How to Garble Arithmetic Circuits
[J].
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011),
2011,
:120-129
[4]
Applebaum B, 2011, LECT NOTES COMPUT SC, V6632, P527, DOI 10.1007/978-3-642-20465-4_29
[5]
Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
[6]
Bai S, 2014, LECT NOTES COMPUT SC, V8544, P322
[7]
Lower bounds for non-black-box zero knowledge
[J].
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2003,
:384-393
[8]
How to go beyond the black-box simulation barrier
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:106-115
[9]
Barak B, 2010, LECT NOTES COMPUT SC, V6110, P423
[10]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287