共 50 条
- [1] Efficient computation modulo a shared secret with application to the generation of shared safe-prime products ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 417 - 432
- [2] Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 343 - 361
- [3] An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol across Insecure Channel 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 143 - 147
- [4] Joining a Distributed Shared Memory Computation in a Dynamic Distributed System SOFTWARE TECHNOLOGIES FOR EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2009, 5860 : 91 - +
- [6] Reliable Delivery Route Computation for Threshold Secret Shared Content 2014 10TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN), 2014,
- [8] Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2016, : 533 - 549
- [9] Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2018, 35 (04):
- [10] Secure Distributed Computation of Anonymized Views of Shared Databases ACM TRANSACTIONS ON DATABASE SYSTEMS, 2012, 37 (02):