共 19 条
- [1] [Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
- [2] More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 673 - 701
- [3] Bendlin R, 2011, LECT NOTES COMPUT SC, V6632, P169, DOI 10.1007/978-3-642-20465-4_11
- [4] Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192
- [5] Universally composable security: A new paradigm for cryptographic protocols [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
- [6] Cramer R, 2003, LECT NOTES COMPUT SC, V2656, P596
- [7] Damgard Ivan, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P1, DOI 10.1007/978-3-642-40203-6_1
- [8] Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 799 - 829
- [9] Confidential Benchmarking Based on Multiparty Computation [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 169 - 187
- [10] Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643