1. Lecture Notes in Computer Science;P Ananth,2017
2. Blum, M.: How to prove a theorem so no one else can claim it. In: Proceedings of the International Congress of Mathematicians, pp. 1444–1454 (1986)
3. Lecture Notes in Computer Science;M Ciampi,2016
4. Lecture Notes in Computer Science;M Ciampi,2017
5. Ciampi, M., Ostrovsky, R., Siniscalchi, L., Visconti, I.: Round-optimal secure two-party computation from trapdoor permutations. Cryptology ePrint Archive, Report 2017/920 (2017).
http://eprint.iacr.org/2017/920