1. Agarwal, A., Bartusek, J.,Goyal, V., Khurana, D., Malavolta, G.: Two-round maliciously secure computation with super-polynomial simulation. In: TCC, pp. 654–685 (2021)
2. Lecture Notes in Computer Science;P Ananth,2017
3. Lecture Notes in Computer Science;P Ananth,2021
4. Lecture Notes in Computer Science;G Asharov,2012
5. Asharov, G., Jain, A., Wichs, D.: Multiparty computation with low communication, computation and interaction via threshold FHE. Cryptology ePrint Archive, Report 2011/613 (2011). https://eprint.iacr.org/2011/613