- a pragmatic introduction to secure multi-party computation, by evans et al.: comprehensive book introducting mpc, protocols such as yao's garbled circuits, gmw, bgw, prepocessed multiplication tiples, bmr, information-theoretic garbled circuits, implentation techniques, oblivious data structures, malicious security, and threat models.
- cryptographic computing, by a. univ
- secure multiparty computation, by lindell: review what MPC is, what problems it solves, and how it is being currently used, including details on shamir secret sharing, honest-majority mpc with secret sharing, output reconstruction, threshold cryptography.
- secure multi-party computation, by ef pse
- backrunning private transactions using mpc, by annessi: diagram for a sgx-based solution for backrunning private txs, talk about covert channels, experiments with mp-spdz, show a poc decoding with rlp.
- exploring cryptographic approaches to enhance privacy in intent solving, by yulia khalniyazova
- mp-spdz, versatile framework for multi-party computation (benchmark several mpc protocols for several security models)