Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions 2007 C. Hazay, J. Katz, C.Y. Koo and Y. Lindell. In TCC 2007, Springer-Verlag (LNCS 4392), pages 323-341, 2007. PDF
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries 2007 Y. Aumann and Y. Lindell. In the Journal of Cryptology, 23(2):281-343, 2010. An extended abstract appeared in TCC 2007, Springer-Verlag (LNCS 4392), pages 137-156, 2007. PDF
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries 2007 Y. Lindell and B. Pinkas In Eurocrypt 2007, Springer-Verlag (LNCS 4515), pages 52-78, 2007. In the Journal of Cryptology, 28(2):312-350, 2015. PDF