Explore a conference talk on oblivious transfer (OT) extension protocols, focusing on a novel three-round universally composable (UC) OT extension. Learn about secure two-party computation, motivations for OT extension, various protocol types, and round complexity. Discover the presenters' contributions, comparisons with existing methods, and insights into the KOS OT extension. Examine weaker requirements for seed OT protocols, efficiency considerations, and potential improvements. Conclude with open questions and references for further research in this cryptographic field.