[١ [باباخانی، م.، نظریۀ بازی ها و رمزنگاری، پایان نامۀ کارشناسی ارشد، دانشگاه مازندران، ١٣٩٣.
[٢ [عبدلی، ق.، نظریۀ بازی ها و کاربردهای آن (بازی های ایستا و پویا با اطلاعات کامل) ، سازمان انتشارات جهاد دانشگاهی،
١٣٨۶ ،تهران
[3] Aumann, R., Subjectivity and correlation in randomized strategies, Mathematical Economics
Journal, 1 (1974), 67–96.
[4] Barany, I., Fair distribution protocols or how the players replace fortune, Mathematics of Operations Research, 17 (1992), no. 2, 327–340.
[5] Dodis, y., Halevi, S., Rabin, T., A cryptographic solution to a game theoretic problem, Advances
in Cryptology – Crypto, 2000, 112–130
[6] Fudenberg, D., Tirole, J., Game Theory, MIT Press, 1991.
[7] Goldwasser, S., Micali, S., Probabilistic encryption, Journal of Computer and System Sciences,
28 (1984), no. 2, 270–299.
[8] Katz, J., Bridging game theory and cryptography: Recent results and future directions, In: 5th
Conference on the Theory of Cryptography, 2008.
[9] Kol, G., Naor, M., Cryptography and game theory: Designing protocols for exchanging information, In: 5th Conference on the Theory of Cryptography, 2008.
[10] Nash, J., Non-cooperative games, Annals of Mathematics, 54 (1951), no. 2, 286–295.
[11] Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V., Algorithmic Game Theory, Cambridge
University Press, Cambridge, 2007.
[12] Teague, V., Selecting correlated random actions, Financial Cryptography, 3110 (2004), 181–
195.