1. B. Applebaum, Z. Brakerski, S. Garg, Y. Ishai, A. Srinivasan, Separating two-round secure computation from oblivious transfer, in Proceedings of the 11th Innovations in Theoretical Computer Science Conference (2020), pp. 71:1–71:18
2. A. Andreev, A. Clementi, J. Rolim, L. Trevisan, Weak random sources, hitting sets, and BPP simulations, in Proceedings of the 38th Annual IEEE Symposium on Foundations of Computer Science, (1997), pp. 264–272
3. A. Andreev, A. Clementi, J. Rolim, A new general derandomization method. Journal of the ACM, 45(1), 179–213 (1998)
4. B. Applebaum, Y. Ishai, E. Kushilevitz, Cryptography in NC$${}^{\text{0 }}$$. SIAM Journal on Computing, 36(4), 845–888 (2006)
5. P. Ananth, A. Jain, Indistinguishability obfuscation from compact functional encryption, in Advances in Cryptology – CRYPTO ’15, (2015), pp. 308–326