共 27 条
- [11] Cramer R., 2005, CONT CRYPTOLOGY ADV
- [12] Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048
- [13] Garay J.A., 2003, LNCS, V2357
- [14] Garay J, 2007, LECT NOTES COMPUT SC, V4450, P330
- [15] Goldreich O., 1987, P 19 ANN ACM S THEOR, P218, DOI DOI 10.1145/28395.28420
- [16] Hazay C, 2012, LECT NOTES COMPUT SC, V7178, P313, DOI 10.1007/978-3-642-27954-6_20
- [17] TASTY: Tool for Automating Secure Two-partY computations [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 451 - 462
- [18] Jonsson K. V., 2011, SECURE MULTIPARTY SO
- [19] Katti R. S., 2012, CORR
- [20] Lipmaa H, 2003, LECT NOTES COMPUT SC, V2357, P87