共 35 条
- [1] [Anonymous], 1981, TR81 HARV U
- [2] [Anonymous], 1986, N HOLLAND MATH STUDI
- [3] Asharov G., 2013, ACM CCS, P535, DOI DOI 10.1145/2508859.2516738
- [4] Asharov G., 2015, IACR CRYPTOLOGY EPRI
- [6] Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
- [7] Damgard Ivan, 2014, Security and Cryptography for Networks. 9th International Conference (SCN 2014). Proceedings: LNCS 8642, P398, DOI 10.1007/978-3-319-10879-7_23
- [8] Damgård I, 2013, LECT NOTES COMPUT SC, V7785, P621, DOI 10.1007/978-3-642-36594-2_35
- [9] Dong C., 2013, P 2013 ACM SIGSAC C, P789
- [10] Ejgenberg Yael., 2012, IACR CRYPTOLOGY EPRI, V2012, P629