1. Yao C. How to generate and exchange secrets / C. Yao // Proc. of27th Annual Symposium on Foundations of Computer Science, 1986. Pp. 162–167.
2. Goldreich O. How to play any mental game / O. Goldreich, S. Micali, A. Wigderson // Proceeding STOC ‘87 Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing. Pp. 218–229.
3. Raykova M. Advanced cryptography on the way to practice / M. Raykova // Real World Cryptography 2019, Switzerland, Zurich, 2019. URL: https://rwc.iacr.org/2019/slides/RWC-Raykova.pdf
4. Halevi, S. Advanced cryptography: Promise and challenges / S. Halevi // Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. P. 647. URL: https://shaih.github.io/pubs/Advanced-Cryptorgaphy.pdf
5. The knowledge complexity of interactive proof systems;Goldwasser;SIAM Journal on Computing,1989