1. Applebaum, B., Harnik, D., Ishai, Y.: Semantic security under related-key attacks and applications. In: Chazelle, B. (ed.) ICS 2011, pp. 45–60. Tsinghua University Press, January 2011
2. Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications (extended abstract). In: 20th Annual IEEE Conference on Computational Complexity (CCC 2005), pp. 260–274 (2005)
3. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography with constant input locality. J. Cryptol. 22(4), 429–469 (2009)
4. Lecture Notes in Computer Science;P Ananth,2020
5. Boyle, E.: Efficient two-round OT extension and silent non-interactive secure computation. In: ACM CCS 19, pp. 291–308. ACM Press (2019)