The following publications are possibly variants of this publication:
- Efficient Two-Round OT Extension and Silent Non-Interactive Secure ComputationElette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl. ccs 2019: 291-308 [doi]
- Efficient Pseudorandom Correlation Generators: Silent OT Extension and MoreElette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl. crypto 2019: 489-518 [doi]
- Efficient Pseudorandom Correlation Generators: Silent OT Extension and MoreElette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl. iacr, 2019:448, 2019. [doi]
- Round-Optimal Black-Box Secure Computation from Two-Round Malicious OTYuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan. tcc 2022: 441-469 [doi]
- Round-Optimal Black-Box Secure Computation from Two-Round Malicious OTYuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan. iacr, 2022:1288, 2022. [doi]
- Efficient Non-interactive Secure ComputationYuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai. eurocrypt 2011: 406-425 [doi]
- OT-Combiners via Secure ComputationDanny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Buus Nielsen. tcc 2008: 393-411 [doi]