A. Yao. Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer
Science, page 160--164. Washington, DC, USA, IEEE Computer Society, (1982)
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Proceedings of the 13th USENIX Security Symposium, page 287--302. Berkeley, CA, USA, USENIX Association, (2004)
K. Kurosawa, and W. Ogata. ESORICS '02: Proceedings of the 7th European Symposium on Research
in Computer Security, volume 2502 of Lecture Notes in Computer Science, page 24--38. London, UK, Springer, (2002)
S. Jha, L. Kruger, and V. Shmatikov. Proceedings of the 2008 IEEE Symposium on Security and Privacy, page 216--230. Washington, DC, USA, IEEE Computer Society, (2008)
M. Jakobsson, and A. Juels. ASIACRYPT '00: Proceedings of the 6th International Conference on
the Theory and Application of Cryptology and Information Security, volume 1976 of Lecture Notes in Computer Science, page 162--177. Springer, (London, UK 2000)
S. Izmalkov, S. Micali, and M. Lepinski. Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer
Science, 2005., page 585-594. New York, NJ, USA, IEEE Computer Society, (October 2005)
O. Goldreich, S. Micali, and A. Wigderson. Proceedings of the nineteenth annual ACM symposium on Theory of computing, page 218--229. New York, NY, USA, ACM, (1987)