1. Y. Azar, A.Z. Broder, A.R. Karlin, E. Upfal, Balanced allocations. SIAM J. Comput.
29(1), 180–200 (1999)
2. G. Ateniese, E. De Cristofaro, G. Tsudik, (if) size matters: Size-hiding private set intersection, in IACR Cryptology ePrint Archive, 2010:220 (2010)
3. G. Ateniese, Ö. Dagdelen, I. Damgård, D. Venturi, Entangled cloud storage, in IACR Cryptology ePrint Archive, 2012:511 (2012)
4. G. Aggarwal, N. Mishra, B. Pinkas, Secure computation of the kth-ranked element, in EUROCRYPT (2004), pp. 40–55
5. R. Bendlin, I. Damgård, C. Orlandi, S. Zakarias, Semi-homomorphic encryption and multiparty computation, in EUROCRYPT (2011), pp. 169–188