Cryptology Write a research paper with the attached documents as the core of the paper. Other references need to be also made from other reliable sources (Papers and journals) Readings: Everlasting Multi-party Computation By Dominique Unruh Secure Computation Without Authentication By Boaz Barak†, Ran Canetti ‡, Yehuda Lindell§, Rafael Pass¶, and Tal Rabin