共 65 条
[1]
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[2]
[Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2508859.2516738
[3]
[Anonymous], 1986, N HOLLAND MATH STUDI
[4]
[Anonymous], 2011, USENIX SECURITY 2011
[5]
[Anonymous], 2013, Financial Cryptography and Data Security
[6]
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:673-701
[8]
Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
[9]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[10]
Efficient Garbling from a Fixed-Key Blockcipher
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:478-492