Author:
Luo Ning,Weng Chenkai,Singh Jaspal,Tan Gefei,Raykova Mariana,Piskac Ruzica
Publisher
Springer Nature Switzerland
Reference44 articles.
1. Angel, S., Ioannidis, E., Margolin, E., Setty, S., Woods, J.: Reef: fast succinct non-interactive zero-knowledge regex proofs. Cryptology ePrint Archive (2023)
2. Baron, J., El Defrawy, K., Minkovich, K., Ostrovsky, R., Tressler, E.: 5pm: secure pattern matching. J. Comput. Secur. 21(5), 601–625 (2013)
3. Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols. In: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, pp. 503–513 (1990)
4. IFIP Advances in Information and Communication Technology;N Beebe,2009
5. Benson, G.: Tandem repeats finder: a program to analyze DNA sequences. Nucleic Acids Res. 27(2), 573–580 (1999)