1. LNCS;D. Beaver,1991
2. D. Beaver, Correlated pseudorandomness and the complexity of private computations, in 28th STOC (1996), pp. 479–488
3. D. Beaver, S. Micali, P. Rogaway, The round complexity of secure protocols, in 22nd STOC (1990), pp. 503–513
4. R. Canetti, Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143–202 (2000)
5. LNCS;C. Dwork,2004