1. Non-interactive secure computation based on cut-and-choose;Afshar,2014
2. On garbling schemes with and without privacy;Baum,2016
3. The round complexity of secure protocols;Beaver,1990
4. Foundations of garbled circuits;Bellare,2012
5. Efficient garbling from a fixed-key blockcipher;Bellare,2013