The following publications are possibly variants of this publication:
- High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest MajorityJun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein. iacr, 2016:944, 2016. [doi]
- High-Throughput Secure Three-Party Computation with an Honest MajorityJun Furukawa 0001, Yehuda Lindell, Ariel Nof, Or Weinstein. joc, 36(3):21, July 2023. [doi]
- High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest MajorityJun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein. eurocrypt 2017: 225-255 [doi]
- High-Throughput Semi-Honest Secure Three-Party Computation with an Honest MajorityToshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara. ccs 2016: 805-817 [doi]
- High-Throughput Semi-Honest Secure Three-Party Computation with an Honest MajorityToshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara. iacr, 2016:768, 2016. [doi]