Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries Posted June 18, 2016 by Alon