[1] T. P. Jakobsen, “Practical aspects of secure multiparty computation,” Department of Computer Science, Aarhus University, 2015.##
[2] A. C. Yao, “Protocols for secure computations,” in 23rd annual symposium on foundations of computer science, pp. 160-164, 1982.##
[3] Y. Lindell and B. Pinkas, “A proof of security of Yao’s protocol for two-party computation,” Journal of cryptology, vol. 22, pp. 161-188, 2009.##
[4] A. C.-C. Yao, “How to generate and exchange secrets,” in 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp. 162-167, 1986.##
[5] O. Goldreich, S. Micali, and A. Wigderson, “How to play any mental game," in Proceedings of the nineteenth annual ACM symposium on Theory of computing, pp. 218-229, 1987.##
[6] S. Goldwasser, S. Micali, and C. Rackoff, “The knowledge complexity of interactive proof systems,” SIAM Journal on computing, vol. 18, pp. 186-208, 1989.##
[7] P. Mohassel and M. Franklin, “Efficiency tradeoffs for malicious two-party computation,” in International Workshop on Public Key Cryptography, pp. 458-473, 2006.##
[8] D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, “Fairplay-Secure Two-Party Computation System,” in USENIX Security Symposium, p. 9, 2004.##
[9] C. Hazay and Y. Lindell, “Efficient secure two-party protocols: Techniques and constructions,” Springer Science & Business Media, 2010.##
[10] Y. Lindell, “Fast cut-and-choose-based protocols for malicious and covert adversaries,” Journal of Cryptology, vol. 29, pp. 456-490, 2016.##
[11] C. Peikert, V. Vaikuntanathan, and B. Waters, “A framework for efficient and composable oblivious transfer,” in Annual international cryptology conference, pp. 554-571, 2008.##
[12] Y. Lindell and B. Pinkas, “Secure two-party computation via cut-and-choose oblivious transfer,” Journal of cryptology, vol. 25, pp. 680-722, 2012.##
[13] H. Jiang, Q. Xu, C. Liu, Z. Zheng, Y. Tang, and M. Wang, “Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption,” Journal of Ambient Intelligence and Humanized Computing, pp. 1-11, 2018.##
[14] X. Wang, A. J. Malozemoff, and J. Katz, “Faster secure two-party computation in the single-execution setting,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 399-424, 2017.##
[15] A. J. Menezes, J. Katz, P. C. Van Oorschot, and S. A. Vanstone, Handbook of applied cryptography: CRC press, 1996.##
[16] Y. Lindell and B. Pinkas, “An efficient protocol for secure two-party computation in the presence of malicious adversaries,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 52-78, 2007.##