The following publications are possibly variants of this publication:
- Two-Round Maliciously-Secure Oblivious Transfer with Optimal RatePedro Branco 0005, Nico Döttling, Akshayaram Srinivasan. eurocrypt 2024: 271-300 [doi]
- Separating Two-Round Secure Computation From Oblivious TransferBenny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan. innovations 2020: [doi]
- Separating Two-Round Secure Computation from Oblivious TransferBenny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan. iacr, 2020:116, 2020. [doi]
- Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious TransferArpita Patra, Akshayaram Srinivasan. crypto 2021: 185-213 [doi]
- Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious TransferArpita Patra, Akshayaram Srinivasan. iacr, 2021:957, 2021. [doi]
- Two-Round Oblivious Transfer from CDH or LPNNico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs. eurocrypt 2020: 768-797 [doi]
- Two-Round Oblivious Transfer from CDH or LPNNico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs. iacr, 2019:414, 2019. [doi]