共 41 条
- [1] How to Efficiently Evaluate RAM Programs with Malicious Security [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 702 - 729
- [2] [Anonymous], 2004, FDN CRYPTOGRAPHY BAS
- [3] [Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
- [4] Ben-Efraim Aner, 2017, Advances in Cryptology - ASIACRYPT 2017. 23rd International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings: LNCS 10625, P471, DOI 10.1007/978-3-319-70697-9_17
- [5] Ben-Efraim A., 2016, OPTIMIZING SEMIHONES, P578
- [6] Function Secret Sharing: Improvements and Extensions [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1292 - 1303
- [7] Function Secret Sharing [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 337 - 367
- [8] Fully Succinct Garbled RAM [J]. ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, : 169 - 178
- [9] Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
- [10] DOERNER J., 2017, CCS