- Lindell and Pinkas, "A Proof of Security of Yao’s Protocol for Two-Party Computation”, Journal of Cryptology, 2008, <https://link.springer.com/article/10.1007%2Fs00145-008-9036-8>
- Cramer et al., "Secure Multiparty Computation and Secret Sharing”, <https://www.cambridge.org/core/books/secure-multiparty-computation-and-secret-sharing/4C2480B202905CE5370B2609F0C2A67A>.
- Gordon et al., "Secure two-party computation in sublinear (amortized) time”, CCS 2012, <https://dl.acm.org/citation.cfm?id=2382251>