1. Aydin Abadi , Steven J Murdoch , and Thomas Zacharias . 2021 . Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited. In European Symposium on Research in Computer Security (Lecture Notes in Computer Science , Vol. 12973). Springer, Cham, 721-- 742 . Aydin Abadi, Steven J Murdoch, and Thomas Zacharias. 2021. Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited. In European Symposium on Research in Computer Security (Lecture Notes in Computer Science, Vol. 12973). Springer, Cham, 721--742.
2. Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
3. Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
4. Elette Boyle , Geoffroy Couteau , Niv Gilboa , Yuval Ishai , Lisa Kohl , and Peter Scholl . 2020. Efficient Pseudorandom Correlation Generators from Ring-LPN . In Advances in Cryptology -- CRYPTO 2020 (Lecture Notes in Computer Science , Vol. 12171). Springer, Cham, 387-- 416 . Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl. 2020. Efficient Pseudorandom Correlation Generators from Ring-LPN. In Advances in Cryptology -- CRYPTO 2020 (Lecture Notes in Computer Science, Vol. 12171). Springer, Cham, 387--416.
5. Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF