1. [1] T. Nishida, T. Mizuki, and H. Sone, “Securely computing the three-input majority function with eight cards,” Theory and Practice of Natural Computing, ed. A.H. Dediu, C. Martín-Vide, B. Truthe, and M.A. Vega-Rodríguez, Lect. Notes Comput. Sci., vol.8273, pp.193-204, 2013.
2. [2] O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications, Cambridge University Press, New York, NY, USA, 2004.
3. [3] T. Schneider, Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation, Springer Berlin Heidelberg, 2012.
4. [4] A.C.C. Yao, “Protocols for secure computations,” Proc. 23rd IEEE Symposium on Foundations of Computer Science, FOCS 1982, pp.160-164, Washington, DC, USA, 1982.
5. [5] J. Balogh, J.A. Csirik, Y. Ishai, and E. Kushilevitz, “Private computation using a PEZ dispenser,” Theor. Comput. Sci., vol.306, no.1-3, pp.69-84, 2003.