1. M+ 1-st price auction using homomorphic encryption;Abe,2002
2. Efficient implementation and computational analysis of privacy-preserving auction protocols;Alvarez,2019
3. Comparing open and sealed bid auctions: evidence from timber auctions;Athey;Q. J. Econ.,2011
4. Completeness theorems for non-cryptographic fault-tolerant distributed computation;Ben-Or,1988
5. Cryptographic protocols for secure second-price auctions;Brandt,2001