共 48 条
[31]
Ishai Yuval, 2013, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. Algorithms and Techniques. 16th International Workshop, APPROX 2013 and 17th International Workshop, RANDOM 2013. Proceedings: LNCS 8096, P607, DOI 10.1007/978-3-642-40328-6_42
[32]
Private circuits: Securing hardware against probing attacks
[J].
ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS,
2003, 2729
:463-481
[33]
Ishai Y., 2015, IACR CRYPTOLOGY EPRI
[34]
Zero-Knowledge from Secure Multiparty Computation
[J].
STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING,
2007,
:21-30
[35]
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II,
2016, 9563
:3-32
[36]
Ishai Y, 2014, LECT NOTES COMPUT SC, V8349, P121, DOI 10.1007/978-3-642-54242-8_6
[37]
Ishai Y, 2012, LECT NOTES COMPUT SC, V7194, P151, DOI 10.1007/978-3-642-28914-9_9
[38]
Kilian J., 1992, Proceedings of the Twenty-Fourth Annual ACM Symposium on the Theory of Computing, P723, DOI 10.1145/129712.129782
[39]
Kilian Joe., 1997, P 20 9 ANN ACM S THE, P496
[40]
Lovett Shachar, 2011, Approximation, Randomization, and Combinatorial Optimization Algorithms and Techniques. Proceedings 14th International Workshop, APPROX 2011 and 15th International Workshop, RANDOM 2011, P640, DOI 10.1007/978-3-642-22935-0_54