1. Mizuki, T., Shizuya, H.: Computational model of card-based cryptographic protocols and its applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100(1), 3–11 (2017)
2. Koch, A.: The landscape of optimal card-based protocols. Math. Cryptol. 1(2), 115–131 (2021)
3. Mizuki, T., Shizuya, H.: A formalization of card-based cryptographic protocols via abstract machine. Int. J. Inf. Security 13(1), 15–23 (2014)
4. Cheung, E., Hawthorne, C., Lee, P.: CS 758 Project: Secure Computation with Playing Cards. http://cdchawthorne.com/writings/secure_playing_cards.pdf (2013)
5. Mizuki, T.: Applications of card-based cryptography to education. In: IEICE Techinical Report ISEC2016-53, pp. 13–17 (2016)