1. More efficient oblivious transfer and extensions for faster secure computation;Asharov,2013
2. Faster secure two-party computation using garbled circuits;Yan,2011
3. How to generate and exchange secrets;Yao,2008
4. An efficient protocol for secure two-party computation in the presence of malicious adversaries;Lindell;J Cryptol,2015
5. Fast cut-and-choose-based protocols for malicious and covert adversaries;Yehuda;J. Cryptol.,2016