The following publications are possibly variants of this publication:
- More Efficient Oblivious Transfer Extensions with Security for Malicious AdversariesGilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner. iacr, 2015:61, 2015. [doi]
- More Efficient Oblivious Transfer ExtensionsGilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner. joc, 30(3):805-858, 2017. [doi]
- More Efficient Oblivious Transfer ExtensionsGilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner. iacr, 2016:602, 2016. [doi]
- Implementing Two-Party Computation Efficiently with Security Against Malicious AdversariesYehuda Lindell, Benny Pinkas, Nigel P. Smart. scn 2008: 2-20 [doi]
- More efficient oblivious transfer and extensions for faster secure computationGilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner. ccs 2013: 535-548 [doi]
- More Efficient Oblivious Transfer and Extensions for Faster Secure ComputationGilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner. iacr, 2013:552, 2013. [doi]