共 65 条
[41]
Keller M., 2013, ACM CCS 2013, P549, DOI DOI 10.1145/2508859.2516744
[42]
Actively Secure OT Extension with Optimal Overhead
[J].
ADVANCES IN CRYPTOLOGY, PT I,
2015, 9215
:724-741
[43]
Kerschbaum F, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P703
[44]
Kolesnikov V, 2008, LECT NOTES COMPUT SC, V5126, P486, DOI 10.1007/978-3-540-70583-3_40
[45]
Kolesnikov V, 2013, LECT NOTES COMPUT SC, V8043, P54, DOI 10.1007/978-3-642-40084-1_4
[46]
Kreuter B., 2012, USENIX SECURITY S, P285
[47]
Larraia E, 2014, LECT NOTES COMPUT SC, V8617, P495, DOI 10.1007/978-3-662-44381-1_28
[48]
Larraia Enrique., 2014, International Conference on Cryptology and Information Security in Latin America, P368, DOI DOI 10.1007/978-3-319-16295-9_20
[49]
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries.
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:579-590
[50]
Lindell Y, 2013, LECT NOTES COMPUT SC, V7785, P519, DOI 10.1007/978-3-642-36594-2_29