@conference{mpc1,
  title={{Perfectly-secure MPC with linear communication complexity}},
  author={Beerliov{\'a}-Trub{\'\i}niov{\'a}, Z. and Hirt, M.},
  booktitle={Proceedings of the 5th conference on Theory of cryptography},
  pages={213--230},
  isbn={354078523X},
  year={2008},
  organization={Springer-Verlag}
}

@conference{mpc2,
  title={{Scalable and unconditionally secure multiparty computation}},
  author={Damg{\aa}rd, I. and Nielsen, J.B.},
  booktitle={Proceedings of the 27th annual international cryptology conference on Advances in cryptology},
  pages={572--590},
  isbn={3540741429},
  year={2007},
  organization={Springer-Verlag}
}

@article{mpc3,
  title={Robust multiparty computation with linear communication complexity},
  author={Hirt, M. and Nielsen, J.},
  journal={Advances in Cryptology-CRYPTO 2006},
  pages={463--482},
  year={2006},
  publisher={Springer}
}

@book{Dolev-Strong,
  title={{Lecture notes in computer science}},
  author={Hartmanis, G.G.J.},
  issn={0302-9743},
  series={Gesellschaft für informatik e.V},
  url={http://books.google.com/books?id=wakAmpekA6kC},
  publisher={Springer-Verlag.}
}

@article{broadcast,
  title={{On protocol security in the cryptographic model}},
  author={Nielsen, J.B.},
  year={2003},
  publisher={Citeseer}
}

@article{SS,
  title={{How to share a secret}},
  author={Shamir, A.},
  journal={Communications of the ACM},
  volume={22},
  number={11},
  pages={612--613},
  issn={0001-0782},
  year={1979},
  publisher={ACM}
}

@misc{long-division,
Author={wiki},
Howpublished={\url{http://rosettacode.org/wiki/Polynomial_long_division}},
Title={Polynomial long division pseudocode}
}

@article{byzantine,
  title={The Byzantine generals problem},
  author={Lamport, L. and Shostak, R. and Pease, M.},
  journal={ACM Transactions on Programming Languages and Systems (TOPLAS)},
  volume={4},
  number={3},
  pages={382--401},
  year={1982},
  publisher={ACM}
}
