1. Lecture Notes in Computer Science;P Ananth,2018
2. Lecture Notes in Computer Science;P Ananth,2019
3. Information Security and Cryptography;B Applebaum,2014
4. Information Security and Cryptography;B Applebaum,2017
5. Applebaum, B., Brakerski, Z., Garg, S., Ishai, Y., Srinivasan, A.: Separating two-round secure computation from oblivious transfer. In: Vidick, T. (ed.) ITCS 2020, LIPIcs, vol. 151, pp. 71:1–71:18 (2020)