1. Lecture Notes in Computer Science;P Ananth,2018
2. Ananth, P., Choudhuri, A.R., Goel, A., Jain, A.: Two round information-theoretic MPC with malicious security. IACR Cryptology ePrint Archive 2018, 1078 (2018). https://eprint.iacr.org/2018/1078
3. Applebaum, B., Brakerski, Z., Tsabary, R.: Perfect secure computation in two rounds. In: 16th International Conference on Theory of Cryptography, TCC 2018 (2018). https://eprint.iacr.org/2018/894
4. Applebaum, B., Brakerski, Z., Tsabary, R.: Degree 2 is complete for the round-complexity of malicious MPC (2019). https://eprint.iacr.org/2019/200
5. Lecture Notes in Computer Science;S Badrinarayanan,2018